Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-53765 (GCVE-0-2025-53765)
Vulnerability from cvelistv5 – Published: 2025-08-12 17:10 – Updated: 2026-02-13 18:54
VLAI?
EPSS
Title
Azure Stack Hub Information Disclosure Vulnerability
Summary
Exposure of private personal information to an unauthorized actor in Azure Stack allows an authorized attacker to disclose information locally.
Severity ?
CWE
- CWE-359 - Exposure of Private Personal Information to an Unauthorized Actor
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Microsoft | Azure Stack Hub |
Affected:
1.0.0 , < 102.10.2.11
(custom)
|
Date Public ?
2025-08-12 07:00
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-53765",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-12T19:58:40.510895Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-12T19:58:51.135Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Azure Stack Hub",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "102.10.2.11",
"status": "affected",
"version": "1.0.0",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:azure_stack_hub:*:*:*:*:*:*:*:*",
"versionEndExcluding": "102.10.2.11",
"versionStartIncluding": "1.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"datePublic": "2025-08-12T07:00:00.000Z",
"descriptions": [
{
"lang": "en-US",
"value": "Exposure of private personal information to an unauthorized actor in Azure Stack allows an authorized attacker to disclose information locally."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en-US",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-359",
"description": "CWE-359: Exposure of Private Personal Information to an Unauthorized Actor",
"lang": "en-US",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-13T18:54:51.624Z",
"orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"shortName": "microsoft"
},
"references": [
{
"name": "Azure Stack Hub Information Disclosure Vulnerability",
"tags": [
"vendor-advisory",
"patch"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53765"
}
],
"title": "Azure Stack Hub Information Disclosure Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"assignerShortName": "microsoft",
"cveId": "CVE-2025-53765",
"datePublished": "2025-08-12T17:10:37.127Z",
"dateReserved": "2025-07-09T13:25:25.500Z",
"dateUpdated": "2026-02-13T18:54:51.624Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-53765\",\"sourceIdentifier\":\"secure@microsoft.com\",\"published\":\"2025-08-12T18:15:45.250\",\"lastModified\":\"2025-08-18T15:21:18.910\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Exposure of private personal information to an unauthorized actor in Azure Stack allows an authorized attacker to disclose information locally.\"},{\"lang\":\"es\",\"value\":\"La exposici\u00f3n de informaci\u00f3n personal privada a un actor no autorizado en Azure Stack permite que un atacante autorizado divulgue informaci\u00f3n localmente.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":4.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":0.8,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-359\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:azure_app_service_on_azure_stack:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"102.10.2.11\",\"matchCriteriaId\":\"D76A5B83-3D29-4C88-B747-12881EB2020C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:microsoft:azure_stack_hub:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.2311.1.22\",\"matchCriteriaId\":\"4DEE9E34-FE45-43E2-BB61-075F9B9DF83D\"}]}]}],\"references\":[{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53765\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-53765\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-08-12T19:58:40.510895Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-08-12T19:58:45.481Z\"}}], \"cna\": {\"title\": \"Azure Stack Hub Information Disclosure Vulnerability\", \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 4.4, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C\"}, \"scenarios\": [{\"lang\": \"en-US\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Microsoft\", \"product\": \"Azure Stack Hub\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0.0\", \"lessThan\": \"102.10.2.11\", \"versionType\": \"custom\"}]}], \"datePublic\": \"2025-08-12T07:00:00.000Z\", \"references\": [{\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53765\", \"name\": \"Azure Stack Hub Information Disclosure Vulnerability\", \"tags\": [\"vendor-advisory\", \"patch\"]}], \"descriptions\": [{\"lang\": \"en-US\", \"value\": \"Exposure of private personal information to an unauthorized actor in Azure Stack allows an authorized attacker to disclose information locally.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en-US\", \"type\": \"CWE\", \"cweId\": \"CWE-359\", \"description\": \"CWE-359: Exposure of Private Personal Information to an Unauthorized Actor\"}]}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:microsoft:azure_stack_hub:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"102.10.2.11\", \"versionStartIncluding\": \"1.0.0\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"shortName\": \"microsoft\", \"dateUpdated\": \"2026-02-13T18:54:51.624Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-53765\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-02-13T18:54:51.624Z\", \"dateReserved\": \"2025-07-09T13:25:25.500Z\", \"assignerOrgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"datePublished\": \"2025-08-12T17:10:37.127Z\", \"assignerShortName\": \"microsoft\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
CERTFR-2025-AVI-0688
Vulnerability from certfr_avis - Published: 2025-08-13 - Updated: 2025-08-13
De multiples vulnérabilités ont été découvertes dans Microsoft Azure. Elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Impacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Azure | Azure File Sync v19 versions antérieures à 19.2.0.0 | ||
| Microsoft | Azure | Azure Stack Hub versions antérieures à 102.10.2.11 | ||
| Microsoft | Azure | Azure Stack Hub 2501 versions antérieures à 1.2501.1.47 | ||
| Microsoft | Azure | Azure File Sync v20 versions antérieures à 20.1.0.0 | ||
| Microsoft | Azure | Azure File Sync v18 versions antérieures à 18.3.0.0 | ||
| Microsoft | Azure | Azure Stack Hub 2406 versions antérieures à 1.2406.1.23 | ||
| Microsoft | Azure | Azure Stack Hub 2408 versions antérieures à 1.2408.1.50 | ||
| Microsoft | Azure | Microsoft SQL Server 2016 pour systèmes x64 Service Pack 3 Azure Connect Feature Pack versions antérieures à 13.0.7060.1 | ||
| Microsoft | Azure | Azure File Sync v21 versions antérieures à 21.1.0.0 |
References
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Azure File Sync v19 versions ant\u00e9rieures \u00e0 19.2.0.0",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Stack Hub versions ant\u00e9rieures \u00e0 102.10.2.11",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Stack Hub 2501 versions ant\u00e9rieures \u00e0 1.2501.1.47",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure File Sync v20 versions ant\u00e9rieures \u00e0 20.1.0.0",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure File Sync v18 versions ant\u00e9rieures \u00e0 18.3.0.0",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Stack Hub 2406 versions ant\u00e9rieures \u00e0 1.2406.1.23",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Stack Hub 2408 versions ant\u00e9rieures \u00e0 1.2408.1.50",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2016 pour syst\u00e8mes x64 Service Pack 3 Azure Connect Feature Pack versions ant\u00e9rieures \u00e0 13.0.7060.1",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure File Sync v21 versions ant\u00e9rieures \u00e0 21.1.0.0",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-53793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53793"
},
{
"name": "CVE-2025-53727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53727"
},
{
"name": "CVE-2025-24999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24999"
},
{
"name": "CVE-2025-53729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53729"
},
{
"name": "CVE-2025-49759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49759"
},
{
"name": "CVE-2025-53781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53781"
},
{
"name": "CVE-2025-49707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49707"
},
{
"name": "CVE-2025-53765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53765"
},
{
"name": "CVE-2025-49758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49758"
}
],
"initial_release_date": "2025-08-13T00:00:00",
"last_revision_date": "2025-08-13T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0688",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Azure. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Azure",
"vendor_advisories": [
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-53729",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53729"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-53793",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53793"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-53781",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53781"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-53727",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53727"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-53765",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53765"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-49758",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49758"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-49759",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49759"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-49707",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49707"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-24999",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24999"
}
]
}
FKIE_CVE-2025-53765
Vulnerability from fkie_nvd - Published: 2025-08-12 18:15 - Updated: 2025-08-18 15:21
Severity ?
4.4 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
Exposure of private personal information to an unauthorized actor in Azure Stack allows an authorized attacker to disclose information locally.
References
| URL | Tags | ||
|---|---|---|---|
| secure@microsoft.com | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53765 | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| microsoft | azure_app_service_on_azure_stack | * | |
| microsoft | azure_stack_hub | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:azure_app_service_on_azure_stack:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D76A5B83-3D29-4C88-B747-12881EB2020C",
"versionEndExcluding": "102.10.2.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:azure_stack_hub:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4DEE9E34-FE45-43E2-BB61-075F9B9DF83D",
"versionEndExcluding": "1.2311.1.22",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Exposure of private personal information to an unauthorized actor in Azure Stack allows an authorized attacker to disclose information locally."
},
{
"lang": "es",
"value": "La exposici\u00f3n de informaci\u00f3n personal privada a un actor no autorizado en Azure Stack permite que un atacante autorizado divulgue informaci\u00f3n localmente."
}
],
"id": "CVE-2025-53765",
"lastModified": "2025-08-18T15:21:18.910",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6,
"source": "secure@microsoft.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-08-12T18:15:45.250",
"references": [
{
"source": "secure@microsoft.com",
"tags": [
"Vendor Advisory"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53765"
}
],
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-359"
}
],
"source": "secure@microsoft.com",
"type": "Secondary"
}
]
}
WID-SEC-W-2025-1780
Vulnerability from csaf_certbund - Published: 2025-08-12 22:00 - Updated: 2025-08-12 22:00Summary
Microsoft Azure: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Azure Stack ist ein Microsoft-Produkt aus der Azure-Familie. Mit Azure Stack können die Public-Cloud-Services von Microsoft auch im eigenen Rechenzentrum betrieben werden.
Azure ist eine Cloud Computing-Plattform von Microsoft.
Angriff: Ein Angreifer kann mehrere Schwachstellen in verschiedenen Komponenten von Microsoft Azure Stack und Microsoft Azure ausnutzen, um seine Privilegien zu erhöhen, und um Informationen offenzulegen.
Betroffene Betriebssysteme: - Windows
References
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Azure Stack ist ein Microsoft-Produkt aus der Azure-Familie. Mit Azure Stack k\u00f6nnen die Public-Cloud-Services von Microsoft auch im eigenen Rechenzentrum betrieben werden.\r\nAzure ist eine Cloud Computing-Plattform von Microsoft.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in verschiedenen Komponenten von Microsoft Azure Stack und Microsoft Azure ausnutzen, um seine Privilegien zu erh\u00f6hen, und um Informationen offenzulegen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1780 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1780.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1780 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1780"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates",
"url": "https://msrc.microsoft.com/update-guide/"
}
],
"source_lang": "en-US",
"title": "Microsoft Azure: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-08-12T22:00:00.000+00:00",
"generator": {
"date": "2025-08-13T07:42:11.094+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-1780",
"initial_release_date": "2025-08-12T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-08-12T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "Open AI",
"product": {
"name": "Microsoft Azure Open AI",
"product_id": "T046012",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:open_ai"
}
}
},
{
"category": "product_version",
"name": "File Sync v18.0",
"product": {
"name": "Microsoft Azure File Sync v18.0",
"product_id": "T046013",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:file_sync_v18.0"
}
}
},
{
"category": "product_version",
"name": "File Sync v19.0",
"product": {
"name": "Microsoft Azure File Sync v19.0",
"product_id": "T046014",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:file_sync_v19.0"
}
}
},
{
"category": "product_version",
"name": "File Sync v20.0",
"product": {
"name": "Microsoft Azure File Sync v20.0",
"product_id": "T046015",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:file_sync_v20.0"
}
}
},
{
"category": "product_version",
"name": "DCasv5-series VM",
"product": {
"name": "Microsoft Azure DCasv5-series VM",
"product_id": "T046016",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:dcasv5-series_vm"
}
}
},
{
"category": "product_version",
"name": "DCadsv5-series VM",
"product": {
"name": "Microsoft Azure DCadsv5-series VM",
"product_id": "T046017",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:dcadsv5-series_vm"
}
}
},
{
"category": "product_version",
"name": "ECasv5-series VM",
"product": {
"name": "Microsoft Azure ECasv5-series VM",
"product_id": "T046019",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:ecasv5-series_vm"
}
}
},
{
"category": "product_version",
"name": "ECadsv5-series VM",
"product": {
"name": "Microsoft Azure ECadsv5-series VM",
"product_id": "T046020",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:ecadsv5-series_vm"
}
}
},
{
"category": "product_version",
"name": "DCesv5-series-VM",
"product": {
"name": "Microsoft Azure DCesv5-series-VM",
"product_id": "T046021",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:dcesv5-series_-_vm"
}
}
},
{
"category": "product_version",
"name": "DCedsv5-series VM",
"product": {
"name": "Microsoft Azure DCedsv5-series VM",
"product_id": "T046022",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:dcedsv5-series_vm"
}
}
},
{
"category": "product_version",
"name": "ECesv5-series VM",
"product": {
"name": "Microsoft Azure ECesv5-series VM",
"product_id": "T046023",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:ecesv5-series_vm"
}
}
},
{
"category": "product_version",
"name": "ECedsv5-series VM",
"product": {
"name": "Microsoft Azure ECedsv5-series VM",
"product_id": "T046024",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:ecedsv5-series_vm"
}
}
},
{
"category": "product_version",
"name": "NCCadsH100v5-series VM",
"product": {
"name": "Microsoft Azure NCCadsH100v5-series VM",
"product_id": "T046025",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:nccadsh100v5-series_vm"
}
}
},
{
"category": "product_version",
"name": "File Sync v21.0",
"product": {
"name": "Microsoft Azure File Sync v21.0",
"product_id": "T046026",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:file_sync_v21.0"
}
}
},
{
"category": "product_version",
"name": "Portal",
"product": {
"name": "Microsoft Azure Portal",
"product_id": "T046027",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:portal"
}
}
},
{
"category": "product_version",
"name": "DCesv6-series VM",
"product": {
"name": "Microsoft Azure DCesv6-series VM",
"product_id": "T046031",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:dcesv6-series_vm"
}
}
},
{
"category": "product_version",
"name": "Ecesv6-series VM",
"product": {
"name": "Microsoft Azure Ecesv6-series VM",
"product_id": "T046032",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:ecesv6-series_vm"
}
}
}
],
"category": "product_name",
"name": "Azure"
},
{
"branches": [
{
"category": "product_version",
"name": "Hub",
"product": {
"name": "Microsoft Azure Stack Hub",
"product_id": "T037430",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure_stack:hub"
}
}
},
{
"category": "product_version",
"name": "Hub 2501",
"product": {
"name": "Microsoft Azure Stack Hub 2501",
"product_id": "T046028",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure_stack:hub_2501"
}
}
},
{
"category": "product_version",
"name": "Hub 2408",
"product": {
"name": "Microsoft Azure Stack Hub 2408",
"product_id": "T046029",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure_stack:hub_2408"
}
}
},
{
"category": "product_version",
"name": "Hub 2406",
"product": {
"name": "Microsoft Azure Stack Hub 2406",
"product_id": "T046030",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure_stack:hub_2406"
}
}
}
],
"category": "product_name",
"name": "Azure Stack"
}
],
"category": "vendor",
"name": "Microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-49707",
"product_status": {
"known_affected": [
"T046030",
"T037430",
"T046019",
"T046017",
"T046028",
"T046029",
"T046022",
"T046012",
"T046023",
"T046020",
"T046031",
"T046021",
"T046032",
"T046015",
"T046026",
"T046016",
"T046027",
"T046013",
"T046024",
"T046014",
"T046025"
]
},
"release_date": "2025-08-12T22:00:00.000+00:00",
"title": "CVE-2025-49707"
},
{
"cve": "CVE-2025-53729",
"product_status": {
"known_affected": [
"T046030",
"T037430",
"T046019",
"T046017",
"T046028",
"T046029",
"T046022",
"T046012",
"T046023",
"T046020",
"T046031",
"T046021",
"T046032",
"T046015",
"T046026",
"T046016",
"T046027",
"T046013",
"T046024",
"T046014",
"T046025"
]
},
"release_date": "2025-08-12T22:00:00.000+00:00",
"title": "CVE-2025-53729"
},
{
"cve": "CVE-2025-53765",
"product_status": {
"known_affected": [
"T046030",
"T037430",
"T046019",
"T046017",
"T046028",
"T046029",
"T046022",
"T046012",
"T046023",
"T046020",
"T046031",
"T046021",
"T046032",
"T046015",
"T046026",
"T046016",
"T046027",
"T046013",
"T046024",
"T046014",
"T046025"
]
},
"release_date": "2025-08-12T22:00:00.000+00:00",
"title": "CVE-2025-53765"
},
{
"cve": "CVE-2025-53767",
"product_status": {
"known_affected": [
"T046030",
"T037430",
"T046019",
"T046017",
"T046028",
"T046029",
"T046022",
"T046012",
"T046023",
"T046020",
"T046031",
"T046021",
"T046032",
"T046015",
"T046026",
"T046016",
"T046027",
"T046013",
"T046024",
"T046014",
"T046025"
]
},
"release_date": "2025-08-12T22:00:00.000+00:00",
"title": "CVE-2025-53767"
},
{
"cve": "CVE-2025-53781",
"product_status": {
"known_affected": [
"T046030",
"T037430",
"T046019",
"T046017",
"T046028",
"T046029",
"T046022",
"T046012",
"T046023",
"T046020",
"T046031",
"T046021",
"T046032",
"T046015",
"T046026",
"T046016",
"T046027",
"T046013",
"T046024",
"T046014",
"T046025"
]
},
"release_date": "2025-08-12T22:00:00.000+00:00",
"title": "CVE-2025-53781"
},
{
"cve": "CVE-2025-53792",
"product_status": {
"known_affected": [
"T046030",
"T037430",
"T046019",
"T046017",
"T046028",
"T046029",
"T046022",
"T046012",
"T046023",
"T046020",
"T046031",
"T046021",
"T046032",
"T046015",
"T046026",
"T046016",
"T046027",
"T046013",
"T046024",
"T046014",
"T046025"
]
},
"release_date": "2025-08-12T22:00:00.000+00:00",
"title": "CVE-2025-53792"
},
{
"cve": "CVE-2025-53793",
"product_status": {
"known_affected": [
"T046030",
"T037430",
"T046019",
"T046017",
"T046028",
"T046029",
"T046022",
"T046012",
"T046023",
"T046020",
"T046031",
"T046021",
"T046032",
"T046015",
"T046026",
"T046016",
"T046027",
"T046013",
"T046024",
"T046014",
"T046025"
]
},
"release_date": "2025-08-12T22:00:00.000+00:00",
"title": "CVE-2025-53793"
}
]
}
NCSC-2025-0249
Vulnerability from csaf_ncscnl - Published: 2025-08-13 07:22 - Updated: 2025-08-13 07:22Summary
Kwetsbaarheden verholpen in Azure-producten
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten: Microsoft heeft kwetsbaarheden verholpen in Azure-producten.
Interpretaties: De kwetsbaarheden zijn gerelateerd aan onjuiste toegangscontrolemechanismen, waardoor geautoriseerde aanvallers lokale spoofing-aanvallen kunnen uitvoeren, verhoogde privileges kunnen verkrijgen, gevoelige informatie kunnen onthullen en de integriteit van systemen kunnen compromitteren. Dit kan leiden tot ongeautoriseerde toegang en manipulatie van gevoelige gegevens.
```
Azure Stack:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-53765 | 4.40 | Toegang tot gevoelige gegevens |
| CVE-2025-53793 | 7.50 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Azure OpenAI:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-53767 | 10.00 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Azure Portal:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-53792 | 9.10 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Azure Virtual Machines:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-53781 | 7.70 | Toegang tot gevoelige gegevens |
| CVE-2025-49707 | 7.90 | Voordoen als andere gebruiker |
|----------------|------|-------------------------------------|
Azure File Sync:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-53729 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
```
Oplossingen: Microsoft heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans: medium
Schade: high
CWE-359: Exposure of Private Personal Information to an Unauthorized Actor
CWE-284: Improper Access Control
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE-287: Improper Authentication
CWE-284
- Improper Access Control
CWE-284
- Improper Access Control
CWE-359
- Exposure of Private Personal Information to an Unauthorized Actor
10.0 (Critical)
CWE-200
- Exposure of Sensitive Information to an Unauthorized Actor
9.1 (Critical)
CWE-22
- Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
References
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Microsoft heeft kwetsbaarheden verholpen in Azure-producten.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden zijn gerelateerd aan onjuiste toegangscontrolemechanismen, waardoor geautoriseerde aanvallers lokale spoofing-aanvallen kunnen uitvoeren, verhoogde privileges kunnen verkrijgen, gevoelige informatie kunnen onthullen en de integriteit van systemen kunnen compromitteren. Dit kan leiden tot ongeautoriseerde toegang en manipulatie van gevoelige gegevens.\n```\nAzure Stack: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53765 | 4.40 | Toegang tot gevoelige gegevens | \n| CVE-2025-53793 | 7.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nAzure OpenAI: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53767 | 10.00 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nAzure Portal: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53792 | 9.10 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nAzure Virtual Machines: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53781 | 7.70 | Toegang tot gevoelige gegevens | \n| CVE-2025-49707 | 7.90 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nAzure File Sync: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53729 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n```",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Microsoft heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Exposure of Private Personal Information to an Unauthorized Actor",
"title": "CWE-359"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://portal.msrc.microsoft.com/en-us/security-guidance"
}
],
"title": "Kwetsbaarheden verholpen in Azure-producten",
"tracking": {
"current_release_date": "2025-08-13T07:22:17.432067Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.2"
}
},
"id": "NCSC-2025-0249",
"initial_release_date": "2025-08-13T07:22:17.432067Z",
"revision_history": [
{
"date": "2025-08-13T07:22:17.432067Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/open ai",
"product": {
"name": "vers:unknown/open ai",
"product_id": "CSAFPID-3039718",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:open_ai"
}
}
},
{
"category": "product_version_range",
"name": "vers:unknown/portal",
"product": {
"name": "vers:unknown/portal",
"product_id": "CSAFPID-3039717",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:portal"
}
}
}
],
"category": "product_name",
"name": "Azure"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/1.0.0|\u003c18.3.0.0",
"product": {
"name": "vers:unknown/1.0.0|\u003c18.3.0.0",
"product_id": "CSAFPID-3049136"
}
}
],
"category": "product_name",
"name": "Azure File Sync"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=1.0.0|\u003c18.0.0.0",
"product": {
"name": "vers:unknown/\u003e=1.0.0|\u003c18.0.0.0",
"product_id": "CSAFPID-3049230"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=1.0.0|\u003c18.3.0.0",
"product": {
"name": "vers:unknown/\u003e=1.0.0|\u003c18.3.0.0",
"product_id": "CSAFPID-3049229"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=18.0|\u003c18.0.0.0",
"product": {
"name": "vers:unknown/\u003e=18.0|\u003c18.0.0.0",
"product_id": "CSAFPID-3048954"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=19.0|\u003c19.1.0.0",
"product": {
"name": "vers:unknown/\u003e=19.0|\u003c19.1.0.0",
"product_id": "CSAFPID-3048951"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=20.0|\u003c20.0.0.0",
"product": {
"name": "vers:unknown/\u003e=20.0|\u003c20.0.0.0",
"product_id": "CSAFPID-3048952"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=21.0|\u003c21.2.0.0",
"product": {
"name": "vers:unknown/\u003e=21.0|\u003c21.2.0.0",
"product_id": "CSAFPID-3048953"
}
}
],
"category": "product_name",
"name": "Azure File Sync"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/1.2406.1.23",
"product": {
"name": "vers:microsoft/1.2406.1.23",
"product_id": "CSAFPID-3049184"
}
},
{
"category": "product_version_range",
"name": "vers:microsoft/1.2408.1.50",
"product": {
"name": "vers:microsoft/1.2408.1.50",
"product_id": "CSAFPID-3049183"
}
},
{
"category": "product_version_range",
"name": "vers:microsoft/1.2501.1.47",
"product": {
"name": "vers:microsoft/1.2501.1.47",
"product_id": "CSAFPID-3049182"
}
},
{
"category": "product_version_range",
"name": "vers:microsoft/102.10.2.11",
"product": {
"name": "vers:microsoft/102.10.2.11",
"product_id": "CSAFPID-3049090"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=1.0.0|\u003c102.10.2.11",
"product": {
"name": "vers:unknown/\u003e=1.0.0|\u003c102.10.2.11",
"product_id": "CSAFPID-3049089"
}
}
],
"category": "product_name",
"name": "Azure Stack Hub"
}
],
"category": "product_family",
"name": "Microsoft"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-3049759",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_file_sync:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure File Sync v18"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-3049760",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_file_sync:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure File Sync v19"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-3049761",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_file_sync:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure File Sync v20"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-3049762",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_file_sync:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure File Sync v21"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-3038235",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_open-AI:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure Open AI"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-3038234",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_portal:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure Portal"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-1560226",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_stack_hub:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure Stack Hub"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-3048852",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_stack_hub_2406:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure Stack Hub 2406"
}
],
"category": "product_family",
"name": "Azure"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/n/a",
"product": {
"name": "vers:unknown/n/a",
"product_id": "CSAFPID-3038148"
}
}
],
"category": "product_name",
"name": "Azure Open AI"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/n/a",
"product": {
"name": "vers:unknown/n/a",
"product_id": "CSAFPID-3038150"
}
}
],
"category": "product_name",
"name": "Azure Portal"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/1.0.0|\u003c102.10.2.11",
"product": {
"name": "vers:unknown/1.0.0|\u003c102.10.2.11",
"product_id": "CSAFPID-3048737"
}
}
],
"category": "product_name",
"name": "Azure Stack Hub"
}
],
"category": "vendor",
"name": "Microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-49707",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-49707 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-49707.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.9,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
}
],
"title": "CVE-2025-49707"
},
{
"cve": "CVE-2025-53729",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53729 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53729.json"
}
],
"title": "CVE-2025-53729"
},
{
"cve": "CVE-2025-53765",
"cwe": {
"id": "CWE-359",
"name": "Exposure of Private Personal Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Private Personal Information to an Unauthorized Actor",
"title": "CWE-359"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53765 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53765.json"
}
],
"title": "CVE-2025-53765"
},
{
"cve": "CVE-2025-53767",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53767 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53767.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
}
],
"title": "CVE-2025-53767"
},
{
"cve": "CVE-2025-53781",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53781 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53781.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
}
],
"title": "CVE-2025-53781"
},
{
"cve": "CVE-2025-53792",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"notes": [
{
"category": "other",
"text": "Improper Authorization",
"title": "CWE-285"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53792 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53792.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
}
],
"title": "CVE-2025-53792"
},
{
"cve": "CVE-2025-53793",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53793 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53793.json"
}
],
"title": "CVE-2025-53793"
}
]
}
BDU:2025-10039
Vulnerability from fstec - Published: 12.08.2025
VLAI Severity ?
Title
Уязвимость интегрированной системы гибридных облачных вычислений Azure Stack Hub, связанная с недостатками разграничения доступа к личной информации, позволяющая нарушителю раскрыть защищаемую информацию
Description
Уязвимость интегрированной системы гибридных облачных вычислений Azure Stack Hub связана с недостатками разграничения доступа к личной информации. Эксплуаатция уязвимости может позволить нарушителю раскрыть защищаемую информацию
Severity ?
Vendor
Microsoft Corp
Software Name
Azure Stack Hub
Software Version
- (Azure Stack Hub)
Possible Mitigations
Использование рекомендаций:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53765
Reference
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53765
CWE
CWE-359
{
"CVSS 2.0": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
"CVSS 3.0": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Microsoft Corp",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "- (Azure Stack Hub)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53765",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "12.08.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "20.08.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "20.08.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-10039",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-53765",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Azure Stack Hub",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0438\u043d\u0442\u0435\u0433\u0440\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0433\u0438\u0431\u0440\u0438\u0434\u043d\u044b\u0445 \u043e\u0431\u043b\u0430\u0447\u043d\u044b\u0445 \u0432\u044b\u0447\u0438\u0441\u043b\u0435\u043d\u0438\u0439 Azure Stack Hub, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430\u043c\u0438 \u0440\u0430\u0437\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u043b\u0438\u0447\u043d\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u044c \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u0443\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0430\u0440\u0443\u0448\u0435\u043d\u0438\u0435 \u043b\u0438\u0447\u043d\u043e\u0439 \u0442\u0430\u0439\u043d\u044b (CWE-359)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0438\u043d\u0442\u0435\u0433\u0440\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0433\u0438\u0431\u0440\u0438\u0434\u043d\u044b\u0445 \u043e\u0431\u043b\u0430\u0447\u043d\u044b\u0445 \u0432\u044b\u0447\u0438\u0441\u043b\u0435\u043d\u0438\u0439 Azure Stack Hub \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430\u043c\u0438 \u0440\u0430\u0437\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u043b\u0438\u0447\u043d\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0430\u0442\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u044c \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u0443\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0441\u0431\u043e\u0440 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53765",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438/\u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-359",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,6)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,4)"
}
GHSA-MM9R-MQF2-8FJ4
Vulnerability from github – Published: 2025-08-12 18:31 – Updated: 2025-08-12 18:31
VLAI?
Details
Exposure of private personal information to an unauthorized actor in Azure Stack allows an authorized attacker to disclose information locally.
Severity ?
4.4 (Medium)
{
"affected": [],
"aliases": [
"CVE-2025-53765"
],
"database_specific": {
"cwe_ids": [
"CWE-359"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-08-12T18:15:45Z",
"severity": "MODERATE"
},
"details": "Exposure of private personal information to an unauthorized actor in Azure Stack allows an authorized attacker to disclose information locally.",
"id": "GHSA-mm9r-mqf2-8fj4",
"modified": "2025-08-12T18:31:32Z",
"published": "2025-08-12T18:31:32Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53765"
},
{
"type": "WEB",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53765"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
]
}
MSRC_CVE-2025-53765
Vulnerability from csaf_microsoft - Published: 2025-08-12 07:00 - Updated: 2025-08-12 07:00Summary
Azure Stack Hub Information Disclosure Vulnerability
Severity
Important
Notes
Additional Resources: To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle
Disclaimer: The information provided in the Microsoft Knowledge Base is provided \"as is\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
Customer Action: Required. The vulnerability documented by this CVE requires customer action to resolve.
CWE-359
- Exposure of Private Personal Information to an Unauthorized Actor
Vendor Fix
102.10.2.11:Security Update:https://learn.microsoft.com/en-us/azure-stack/operator/app-service-release-notes-2025r1?view=azs-2501&tabs=EntraID
https://learn.microsoft.com/en-us/azure-stack/ope…
References
| URL | Category | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
Acknowledgments
Anonymous
{
"document": {
"acknowledgments": [
{
"names": [
"Anonymous"
]
}
],
"aggregate_severity": {
"namespace": "https://www.microsoft.com/en-us/msrc/security-update-severity-rating-system",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
},
{
"category": "general",
"text": "Required. The vulnerability documented by this CVE requires customer action to resolve.",
"title": "Customer Action"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53765 Azure Stack Hub Information Disclosure Vulnerability - HTML",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53765"
},
{
"category": "self",
"summary": "CVE-2025-53765 Azure Stack Hub Information Disclosure Vulnerability - CSAF",
"url": "https://msrc.microsoft.com/csaf/advisories/2025/msrc_cve-2025-53765.json"
},
{
"category": "external",
"summary": "Microsoft Exploitability Index",
"url": "https://www.microsoft.com/en-us/msrc/exploitability-index?rtc=1"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Azure Stack Hub Information Disclosure Vulnerability",
"tracking": {
"current_release_date": "2025-08-12T07:00:00.000Z",
"generator": {
"date": "2025-11-10T00:11:43.015Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-53765",
"initial_release_date": "2025-08-12T07:00:00.000Z",
"revision_history": [
{
"date": "2025-08-12T07:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c102.10.2.11",
"product": {
"name": "Azure Stack Hub \u003c102.10.2.11",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "102.10.2.11",
"product": {
"name": "Azure Stack Hub 102.10.2.11",
"product_id": "11950"
}
}
],
"category": "product_name",
"name": "Azure Stack Hub"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-53765",
"cwe": {
"id": "CWE-359",
"name": "Exposure of Private Personal Information to an Unauthorized Actor"
},
"notes": [
{
"category": "general",
"text": "Microsoft",
"title": "Assigning CNA"
},
{
"category": "faq",
"text": "This vulnerability could disclose administrator account passwords in the logs.",
"title": "What type of information could be disclosed by this vulnerability?"
}
],
"product_status": {
"fixed": [
"11950"
],
"known_affected": [
"1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53765 Azure Stack Hub Information Disclosure Vulnerability - HTML",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53765"
},
{
"category": "self",
"summary": "CVE-2025-53765 Azure Stack Hub Information Disclosure Vulnerability - CSAF",
"url": "https://msrc.microsoft.com/csaf/advisories/2025/msrc_cve-2025-53765.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-12T07:00:00.000Z",
"details": "102.10.2.11:Security Update:https://learn.microsoft.com/en-us/azure-stack/operator/app-service-release-notes-2025r1?view=azs-2501\u0026tabs=EntraID",
"product_ids": [
"1"
],
"url": "https://learn.microsoft.com/en-us/azure-stack/operator/app-service-release-notes-2025r1?view=azs-2501\u0026tabs=EntraID"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"exploitCodeMaturity": "UNPROVEN",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"remediationLevel": "OFFICIAL_FIX",
"reportConfidence": "CONFIRMED",
"scope": "UNCHANGED",
"temporalScore": 3.9,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Information Disclosure"
},
{
"category": "exploit_status",
"details": "Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely"
}
],
"title": "Azure Stack Hub Information Disclosure Vulnerability"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…