Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-53792 (GCVE-0-2025-53792)
Vulnerability from cvelistv5 – Published: 2025-08-07 21:01 – Updated: 2026-02-26 17:49 Exclusively Hosted Service
VLAI?
EPSS
Title
Azure Portal Elevation of Privilege Vulnerability
Summary
Azure Portal Elevation of Privilege Vulnerability
Severity ?
9.1 (Critical)
CWE
- CWE-285 - Improper Authorization
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Microsoft | Azure Portal |
Affected:
-
|
Date Public ?
2025-08-07 07:00
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-53792",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-13T15:03:48.373943Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-26T17:49:49.395Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Azure Portal",
"vendor": "Microsoft",
"versions": [
{
"status": "affected",
"version": "-"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:azure_portal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "-",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"datePublic": "2025-08-07T07:00:00.000Z",
"descriptions": [
{
"lang": "en-US",
"value": "Azure Portal Elevation of Privilege Vulnerability"
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en-US",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-285",
"description": "CWE-285: Improper Authorization",
"lang": "en-US",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-13T18:54:58.515Z",
"orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"shortName": "microsoft"
},
"references": [
{
"name": "Azure Portal Elevation of Privilege Vulnerability",
"tags": [
"vendor-advisory",
"patch"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53792"
}
],
"tags": [
"exclusively-hosted-service"
],
"title": "Azure Portal Elevation of Privilege Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"assignerShortName": "microsoft",
"cveId": "CVE-2025-53792",
"datePublished": "2025-08-07T21:01:01.529Z",
"dateReserved": "2025-07-09T13:40:07.625Z",
"dateUpdated": "2026-02-26T17:49:49.395Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-53792\",\"sourceIdentifier\":\"secure@microsoft.com\",\"published\":\"2025-08-07T21:15:28.593\",\"lastModified\":\"2025-08-14T17:34:08.153\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[{\"sourceIdentifier\":\"secure@microsoft.com\",\"tags\":[\"exclusively-hosted-service\"]}],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Azure Portal Elevation of Privilege Vulnerability\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de elevaci\u00f3n de privilegios en el portal de Azure\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N\",\"baseScore\":9.1,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-285\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:azure_portal:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F32E13E9-F5FD-431A-BC3C-0A20D303E1FC\"}]}]}],\"references\":[{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53792\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-53792\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-08-08T16:49:47.043416Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-08-08T16:50:08.222Z\"}}], \"cna\": {\"tags\": [\"exclusively-hosted-service\"], \"title\": \"Azure Portal Elevation of Privilege Vulnerability\", \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 9.1, \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C\"}, \"scenarios\": [{\"lang\": \"en-US\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Microsoft\", \"product\": \"Azure Portal\", \"versions\": [{\"status\": \"affected\", \"version\": \"-\"}]}], \"datePublic\": \"2025-08-07T07:00:00.000Z\", \"references\": [{\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53792\", \"name\": \"Azure Portal Elevation of Privilege Vulnerability\", \"tags\": [\"vendor-advisory\", \"patch\"]}], \"descriptions\": [{\"lang\": \"en-US\", \"value\": \"Azure Portal Elevation of Privilege Vulnerability\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en-US\", \"type\": \"CWE\", \"cweId\": \"CWE-285\", \"description\": \"CWE-285: Improper Authorization\"}]}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:microsoft:azure_portal:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"-\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"shortName\": \"microsoft\", \"dateUpdated\": \"2026-02-13T18:54:58.515Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-53792\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-02-13T18:54:58.515Z\", \"dateReserved\": \"2025-07-09T13:40:07.625Z\", \"assignerOrgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"datePublished\": \"2025-08-07T21:01:01.529Z\", \"assignerShortName\": \"microsoft\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
BDU:2025-10037
Vulnerability from fstec - Published: 07.08.2025
VLAI Severity ?
Title
Уязвимость веб-консоли для создания и управления ресурсами Azure Portal, связанная с недостатками процедуры авторизации, позволяющая нарушителю повысить свои привилегии
Description
Уязвимость веб-консоли для создания и управления ресурсами Azure Portal связана с недостатками процедуры авторизации. Эксплуатация уязвимости может позволить нарушителю, действующему удалённо, повысить свои привилегии
Severity ?
Vendor
Microsoft Corp
Software Name
Azure Portal
Software Version
- (Azure Portal)
Possible Mitigations
Использование рекомендаций:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53792
Reference
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53792
CWE
CWE-285
{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:C/I:C/A:N",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Microsoft Corp",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "- (Azure Portal)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53792",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "07.08.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "20.08.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "20.08.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-10037",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-53792",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Azure Portal",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u0435\u0431-\u043a\u043e\u043d\u0441\u043e\u043b\u0438 \u0434\u043b\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u0438 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438 Azure Portal, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430\u043c\u0438 \u043f\u0440\u043e\u0446\u0435\u0434\u0443\u0440\u044b \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u0430\u044f \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u044f (CWE-285)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u0435\u0431-\u043a\u043e\u043d\u0441\u043e\u043b\u0438 \u0434\u043b\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u0438 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438 Azure Portal \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430\u043c\u0438 \u043f\u0440\u043e\u0446\u0435\u0434\u0443\u0440\u044b \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041d\u0430\u0440\u0443\u0448\u0435\u043d\u0438\u0435 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53792",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-285",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 9,4)\n\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 9,1)"
}
WID-SEC-W-2025-1780
Vulnerability from csaf_certbund - Published: 2025-08-12 22:00 - Updated: 2025-08-12 22:00Summary
Microsoft Azure: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Azure Stack ist ein Microsoft-Produkt aus der Azure-Familie. Mit Azure Stack können die Public-Cloud-Services von Microsoft auch im eigenen Rechenzentrum betrieben werden.
Azure ist eine Cloud Computing-Plattform von Microsoft.
Angriff: Ein Angreifer kann mehrere Schwachstellen in verschiedenen Komponenten von Microsoft Azure Stack und Microsoft Azure ausnutzen, um seine Privilegien zu erhöhen, und um Informationen offenzulegen.
Betroffene Betriebssysteme: - Windows
References
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Azure Stack ist ein Microsoft-Produkt aus der Azure-Familie. Mit Azure Stack k\u00f6nnen die Public-Cloud-Services von Microsoft auch im eigenen Rechenzentrum betrieben werden.\r\nAzure ist eine Cloud Computing-Plattform von Microsoft.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in verschiedenen Komponenten von Microsoft Azure Stack und Microsoft Azure ausnutzen, um seine Privilegien zu erh\u00f6hen, und um Informationen offenzulegen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1780 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1780.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1780 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1780"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates",
"url": "https://msrc.microsoft.com/update-guide/"
}
],
"source_lang": "en-US",
"title": "Microsoft Azure: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-08-12T22:00:00.000+00:00",
"generator": {
"date": "2025-08-13T07:42:11.094+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-1780",
"initial_release_date": "2025-08-12T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-08-12T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "Open AI",
"product": {
"name": "Microsoft Azure Open AI",
"product_id": "T046012",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:open_ai"
}
}
},
{
"category": "product_version",
"name": "File Sync v18.0",
"product": {
"name": "Microsoft Azure File Sync v18.0",
"product_id": "T046013",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:file_sync_v18.0"
}
}
},
{
"category": "product_version",
"name": "File Sync v19.0",
"product": {
"name": "Microsoft Azure File Sync v19.0",
"product_id": "T046014",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:file_sync_v19.0"
}
}
},
{
"category": "product_version",
"name": "File Sync v20.0",
"product": {
"name": "Microsoft Azure File Sync v20.0",
"product_id": "T046015",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:file_sync_v20.0"
}
}
},
{
"category": "product_version",
"name": "DCasv5-series VM",
"product": {
"name": "Microsoft Azure DCasv5-series VM",
"product_id": "T046016",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:dcasv5-series_vm"
}
}
},
{
"category": "product_version",
"name": "DCadsv5-series VM",
"product": {
"name": "Microsoft Azure DCadsv5-series VM",
"product_id": "T046017",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:dcadsv5-series_vm"
}
}
},
{
"category": "product_version",
"name": "ECasv5-series VM",
"product": {
"name": "Microsoft Azure ECasv5-series VM",
"product_id": "T046019",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:ecasv5-series_vm"
}
}
},
{
"category": "product_version",
"name": "ECadsv5-series VM",
"product": {
"name": "Microsoft Azure ECadsv5-series VM",
"product_id": "T046020",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:ecadsv5-series_vm"
}
}
},
{
"category": "product_version",
"name": "DCesv5-series-VM",
"product": {
"name": "Microsoft Azure DCesv5-series-VM",
"product_id": "T046021",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:dcesv5-series_-_vm"
}
}
},
{
"category": "product_version",
"name": "DCedsv5-series VM",
"product": {
"name": "Microsoft Azure DCedsv5-series VM",
"product_id": "T046022",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:dcedsv5-series_vm"
}
}
},
{
"category": "product_version",
"name": "ECesv5-series VM",
"product": {
"name": "Microsoft Azure ECesv5-series VM",
"product_id": "T046023",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:ecesv5-series_vm"
}
}
},
{
"category": "product_version",
"name": "ECedsv5-series VM",
"product": {
"name": "Microsoft Azure ECedsv5-series VM",
"product_id": "T046024",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:ecedsv5-series_vm"
}
}
},
{
"category": "product_version",
"name": "NCCadsH100v5-series VM",
"product": {
"name": "Microsoft Azure NCCadsH100v5-series VM",
"product_id": "T046025",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:nccadsh100v5-series_vm"
}
}
},
{
"category": "product_version",
"name": "File Sync v21.0",
"product": {
"name": "Microsoft Azure File Sync v21.0",
"product_id": "T046026",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:file_sync_v21.0"
}
}
},
{
"category": "product_version",
"name": "Portal",
"product": {
"name": "Microsoft Azure Portal",
"product_id": "T046027",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:portal"
}
}
},
{
"category": "product_version",
"name": "DCesv6-series VM",
"product": {
"name": "Microsoft Azure DCesv6-series VM",
"product_id": "T046031",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:dcesv6-series_vm"
}
}
},
{
"category": "product_version",
"name": "Ecesv6-series VM",
"product": {
"name": "Microsoft Azure Ecesv6-series VM",
"product_id": "T046032",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:ecesv6-series_vm"
}
}
}
],
"category": "product_name",
"name": "Azure"
},
{
"branches": [
{
"category": "product_version",
"name": "Hub",
"product": {
"name": "Microsoft Azure Stack Hub",
"product_id": "T037430",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure_stack:hub"
}
}
},
{
"category": "product_version",
"name": "Hub 2501",
"product": {
"name": "Microsoft Azure Stack Hub 2501",
"product_id": "T046028",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure_stack:hub_2501"
}
}
},
{
"category": "product_version",
"name": "Hub 2408",
"product": {
"name": "Microsoft Azure Stack Hub 2408",
"product_id": "T046029",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure_stack:hub_2408"
}
}
},
{
"category": "product_version",
"name": "Hub 2406",
"product": {
"name": "Microsoft Azure Stack Hub 2406",
"product_id": "T046030",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure_stack:hub_2406"
}
}
}
],
"category": "product_name",
"name": "Azure Stack"
}
],
"category": "vendor",
"name": "Microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-49707",
"product_status": {
"known_affected": [
"T046030",
"T037430",
"T046019",
"T046017",
"T046028",
"T046029",
"T046022",
"T046012",
"T046023",
"T046020",
"T046031",
"T046021",
"T046032",
"T046015",
"T046026",
"T046016",
"T046027",
"T046013",
"T046024",
"T046014",
"T046025"
]
},
"release_date": "2025-08-12T22:00:00.000+00:00",
"title": "CVE-2025-49707"
},
{
"cve": "CVE-2025-53729",
"product_status": {
"known_affected": [
"T046030",
"T037430",
"T046019",
"T046017",
"T046028",
"T046029",
"T046022",
"T046012",
"T046023",
"T046020",
"T046031",
"T046021",
"T046032",
"T046015",
"T046026",
"T046016",
"T046027",
"T046013",
"T046024",
"T046014",
"T046025"
]
},
"release_date": "2025-08-12T22:00:00.000+00:00",
"title": "CVE-2025-53729"
},
{
"cve": "CVE-2025-53765",
"product_status": {
"known_affected": [
"T046030",
"T037430",
"T046019",
"T046017",
"T046028",
"T046029",
"T046022",
"T046012",
"T046023",
"T046020",
"T046031",
"T046021",
"T046032",
"T046015",
"T046026",
"T046016",
"T046027",
"T046013",
"T046024",
"T046014",
"T046025"
]
},
"release_date": "2025-08-12T22:00:00.000+00:00",
"title": "CVE-2025-53765"
},
{
"cve": "CVE-2025-53767",
"product_status": {
"known_affected": [
"T046030",
"T037430",
"T046019",
"T046017",
"T046028",
"T046029",
"T046022",
"T046012",
"T046023",
"T046020",
"T046031",
"T046021",
"T046032",
"T046015",
"T046026",
"T046016",
"T046027",
"T046013",
"T046024",
"T046014",
"T046025"
]
},
"release_date": "2025-08-12T22:00:00.000+00:00",
"title": "CVE-2025-53767"
},
{
"cve": "CVE-2025-53781",
"product_status": {
"known_affected": [
"T046030",
"T037430",
"T046019",
"T046017",
"T046028",
"T046029",
"T046022",
"T046012",
"T046023",
"T046020",
"T046031",
"T046021",
"T046032",
"T046015",
"T046026",
"T046016",
"T046027",
"T046013",
"T046024",
"T046014",
"T046025"
]
},
"release_date": "2025-08-12T22:00:00.000+00:00",
"title": "CVE-2025-53781"
},
{
"cve": "CVE-2025-53792",
"product_status": {
"known_affected": [
"T046030",
"T037430",
"T046019",
"T046017",
"T046028",
"T046029",
"T046022",
"T046012",
"T046023",
"T046020",
"T046031",
"T046021",
"T046032",
"T046015",
"T046026",
"T046016",
"T046027",
"T046013",
"T046024",
"T046014",
"T046025"
]
},
"release_date": "2025-08-12T22:00:00.000+00:00",
"title": "CVE-2025-53792"
},
{
"cve": "CVE-2025-53793",
"product_status": {
"known_affected": [
"T046030",
"T037430",
"T046019",
"T046017",
"T046028",
"T046029",
"T046022",
"T046012",
"T046023",
"T046020",
"T046031",
"T046021",
"T046032",
"T046015",
"T046026",
"T046016",
"T046027",
"T046013",
"T046024",
"T046014",
"T046025"
]
},
"release_date": "2025-08-12T22:00:00.000+00:00",
"title": "CVE-2025-53793"
}
]
}
WID-SEC-W-2025-1745
Vulnerability from csaf_certbund - Published: 2025-08-07 22:00 - Updated: 2025-08-10 22:00Summary
Microsoft Azure: Mehrere Schwachstellen ermöglichen Privilegieneskalation
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Azure ist eine Cloud Computing-Plattform von Microsoft.
Angriff: Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Microsoft Azure ausnutzen, um seine Privilegien zu erhöhen.
Betroffene Betriebssysteme: - Windows
References
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Azure ist eine Cloud Computing-Plattform von Microsoft.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Microsoft Azure ausnutzen, um seine Privilegien zu erh\u00f6hen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1745 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1745.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1745 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1745"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53792"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53767"
}
],
"source_lang": "en-US",
"title": "Microsoft Azure: Mehrere Schwachstellen erm\u00f6glichen Privilegieneskalation",
"tracking": {
"current_release_date": "2025-08-10T22:00:00.000+00:00",
"generator": {
"date": "2025-08-11T07:52:50.830+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-1745",
"initial_release_date": "2025-08-07T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-08-07T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-08-10T22:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: EUVD-2025-23958, EUVD-2025-23957"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "Open AI",
"product": {
"name": "Microsoft Azure Open AI",
"product_id": "T045948",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:open_ai"
}
}
},
{
"category": "product_version",
"name": "Portal",
"product": {
"name": "Microsoft Azure Portal",
"product_id": "T045949",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:portal"
}
}
}
],
"category": "product_name",
"name": "Azure"
}
],
"category": "vendor",
"name": "Microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-53767",
"product_status": {
"known_affected": [
"T045949",
"T045948"
]
},
"release_date": "2025-08-07T22:00:00.000+00:00",
"title": "CVE-2025-53767"
},
{
"cve": "CVE-2025-53792",
"product_status": {
"known_affected": [
"T045949",
"T045948"
]
},
"release_date": "2025-08-07T22:00:00.000+00:00",
"title": "CVE-2025-53792"
}
]
}
NCSC-2025-0249
Vulnerability from csaf_ncscnl - Published: 2025-08-13 07:22 - Updated: 2025-08-13 07:22Summary
Kwetsbaarheden verholpen in Azure-producten
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten: Microsoft heeft kwetsbaarheden verholpen in Azure-producten.
Interpretaties: De kwetsbaarheden zijn gerelateerd aan onjuiste toegangscontrolemechanismen, waardoor geautoriseerde aanvallers lokale spoofing-aanvallen kunnen uitvoeren, verhoogde privileges kunnen verkrijgen, gevoelige informatie kunnen onthullen en de integriteit van systemen kunnen compromitteren. Dit kan leiden tot ongeautoriseerde toegang en manipulatie van gevoelige gegevens.
```
Azure Stack:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-53765 | 4.40 | Toegang tot gevoelige gegevens |
| CVE-2025-53793 | 7.50 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Azure OpenAI:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-53767 | 10.00 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Azure Portal:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-53792 | 9.10 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Azure Virtual Machines:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-53781 | 7.70 | Toegang tot gevoelige gegevens |
| CVE-2025-49707 | 7.90 | Voordoen als andere gebruiker |
|----------------|------|-------------------------------------|
Azure File Sync:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-53729 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
```
Oplossingen: Microsoft heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans: medium
Schade: high
CWE-359: Exposure of Private Personal Information to an Unauthorized Actor
CWE-284: Improper Access Control
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE-287: Improper Authentication
CWE-284
- Improper Access Control
CWE-284
- Improper Access Control
CWE-359
- Exposure of Private Personal Information to an Unauthorized Actor
10.0 (Critical)
CWE-200
- Exposure of Sensitive Information to an Unauthorized Actor
9.1 (Critical)
CWE-22
- Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
References
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Microsoft heeft kwetsbaarheden verholpen in Azure-producten.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden zijn gerelateerd aan onjuiste toegangscontrolemechanismen, waardoor geautoriseerde aanvallers lokale spoofing-aanvallen kunnen uitvoeren, verhoogde privileges kunnen verkrijgen, gevoelige informatie kunnen onthullen en de integriteit van systemen kunnen compromitteren. Dit kan leiden tot ongeautoriseerde toegang en manipulatie van gevoelige gegevens.\n```\nAzure Stack: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53765 | 4.40 | Toegang tot gevoelige gegevens | \n| CVE-2025-53793 | 7.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nAzure OpenAI: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53767 | 10.00 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nAzure Portal: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53792 | 9.10 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nAzure Virtual Machines: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53781 | 7.70 | Toegang tot gevoelige gegevens | \n| CVE-2025-49707 | 7.90 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nAzure File Sync: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53729 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n```",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Microsoft heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Exposure of Private Personal Information to an Unauthorized Actor",
"title": "CWE-359"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://portal.msrc.microsoft.com/en-us/security-guidance"
}
],
"title": "Kwetsbaarheden verholpen in Azure-producten",
"tracking": {
"current_release_date": "2025-08-13T07:22:17.432067Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.2"
}
},
"id": "NCSC-2025-0249",
"initial_release_date": "2025-08-13T07:22:17.432067Z",
"revision_history": [
{
"date": "2025-08-13T07:22:17.432067Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/open ai",
"product": {
"name": "vers:unknown/open ai",
"product_id": "CSAFPID-3039718",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:open_ai"
}
}
},
{
"category": "product_version_range",
"name": "vers:unknown/portal",
"product": {
"name": "vers:unknown/portal",
"product_id": "CSAFPID-3039717",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:portal"
}
}
}
],
"category": "product_name",
"name": "Azure"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/1.0.0|\u003c18.3.0.0",
"product": {
"name": "vers:unknown/1.0.0|\u003c18.3.0.0",
"product_id": "CSAFPID-3049136"
}
}
],
"category": "product_name",
"name": "Azure File Sync"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=1.0.0|\u003c18.0.0.0",
"product": {
"name": "vers:unknown/\u003e=1.0.0|\u003c18.0.0.0",
"product_id": "CSAFPID-3049230"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=1.0.0|\u003c18.3.0.0",
"product": {
"name": "vers:unknown/\u003e=1.0.0|\u003c18.3.0.0",
"product_id": "CSAFPID-3049229"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=18.0|\u003c18.0.0.0",
"product": {
"name": "vers:unknown/\u003e=18.0|\u003c18.0.0.0",
"product_id": "CSAFPID-3048954"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=19.0|\u003c19.1.0.0",
"product": {
"name": "vers:unknown/\u003e=19.0|\u003c19.1.0.0",
"product_id": "CSAFPID-3048951"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=20.0|\u003c20.0.0.0",
"product": {
"name": "vers:unknown/\u003e=20.0|\u003c20.0.0.0",
"product_id": "CSAFPID-3048952"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=21.0|\u003c21.2.0.0",
"product": {
"name": "vers:unknown/\u003e=21.0|\u003c21.2.0.0",
"product_id": "CSAFPID-3048953"
}
}
],
"category": "product_name",
"name": "Azure File Sync"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/1.2406.1.23",
"product": {
"name": "vers:microsoft/1.2406.1.23",
"product_id": "CSAFPID-3049184"
}
},
{
"category": "product_version_range",
"name": "vers:microsoft/1.2408.1.50",
"product": {
"name": "vers:microsoft/1.2408.1.50",
"product_id": "CSAFPID-3049183"
}
},
{
"category": "product_version_range",
"name": "vers:microsoft/1.2501.1.47",
"product": {
"name": "vers:microsoft/1.2501.1.47",
"product_id": "CSAFPID-3049182"
}
},
{
"category": "product_version_range",
"name": "vers:microsoft/102.10.2.11",
"product": {
"name": "vers:microsoft/102.10.2.11",
"product_id": "CSAFPID-3049090"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=1.0.0|\u003c102.10.2.11",
"product": {
"name": "vers:unknown/\u003e=1.0.0|\u003c102.10.2.11",
"product_id": "CSAFPID-3049089"
}
}
],
"category": "product_name",
"name": "Azure Stack Hub"
}
],
"category": "product_family",
"name": "Microsoft"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-3049759",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_file_sync:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure File Sync v18"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-3049760",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_file_sync:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure File Sync v19"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-3049761",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_file_sync:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure File Sync v20"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-3049762",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_file_sync:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure File Sync v21"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-3038235",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_open-AI:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure Open AI"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-3038234",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_portal:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure Portal"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-1560226",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_stack_hub:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure Stack Hub"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-3048852",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_stack_hub_2406:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure Stack Hub 2406"
}
],
"category": "product_family",
"name": "Azure"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/n/a",
"product": {
"name": "vers:unknown/n/a",
"product_id": "CSAFPID-3038148"
}
}
],
"category": "product_name",
"name": "Azure Open AI"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/n/a",
"product": {
"name": "vers:unknown/n/a",
"product_id": "CSAFPID-3038150"
}
}
],
"category": "product_name",
"name": "Azure Portal"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/1.0.0|\u003c102.10.2.11",
"product": {
"name": "vers:unknown/1.0.0|\u003c102.10.2.11",
"product_id": "CSAFPID-3048737"
}
}
],
"category": "product_name",
"name": "Azure Stack Hub"
}
],
"category": "vendor",
"name": "Microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-49707",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-49707 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-49707.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.9,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
}
],
"title": "CVE-2025-49707"
},
{
"cve": "CVE-2025-53729",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53729 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53729.json"
}
],
"title": "CVE-2025-53729"
},
{
"cve": "CVE-2025-53765",
"cwe": {
"id": "CWE-359",
"name": "Exposure of Private Personal Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Private Personal Information to an Unauthorized Actor",
"title": "CWE-359"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53765 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53765.json"
}
],
"title": "CVE-2025-53765"
},
{
"cve": "CVE-2025-53767",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53767 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53767.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
}
],
"title": "CVE-2025-53767"
},
{
"cve": "CVE-2025-53781",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53781 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53781.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
}
],
"title": "CVE-2025-53781"
},
{
"cve": "CVE-2025-53792",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"notes": [
{
"category": "other",
"text": "Improper Authorization",
"title": "CWE-285"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53792 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53792.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
}
],
"title": "CVE-2025-53792"
},
{
"cve": "CVE-2025-53793",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53793 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53793.json"
}
],
"title": "CVE-2025-53793"
}
]
}
GHSA-FMW5-GWXJ-CJ4Q
Vulnerability from github – Published: 2025-08-07 21:31 – Updated: 2025-08-07 21:31
VLAI?
Details
Azure Portal Elevation of Privilege Vulnerability
Severity ?
9.1 (Critical)
{
"affected": [],
"aliases": [
"CVE-2025-53792"
],
"database_specific": {
"cwe_ids": [
"CWE-285"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-08-07T21:15:28Z",
"severity": "CRITICAL"
},
"details": "Azure Portal Elevation of Privilege Vulnerability",
"id": "GHSA-fmw5-gwxj-cj4q",
"modified": "2025-08-07T21:31:08Z",
"published": "2025-08-07T21:31:08Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53792"
},
{
"type": "WEB",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53792"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"type": "CVSS_V3"
}
]
}
MSRC_CVE-2025-53792
Vulnerability from csaf_microsoft - Published: 2025-08-12 07:00 - Updated: 2025-08-07 07:00Summary
Azure Portal Elevation of Privilege Vulnerability
Severity
Critical
Notes
Additional Resources: To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle
Disclaimer: The information provided in the Microsoft Knowledge Base is provided \"as is\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
Customer Action: Not required. The vulnerability documented by this CVE requires no customer action to resolve.
9.1 (Critical)
References
| URL | Category | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
Acknowledgments
<a href="https://twitter.com/hoangnx99">nxhoang99</a> with <a href="https://lab.viettelcybersecurity.com/">VCSLab of Viettel Cyber Security</a>
{
"document": {
"acknowledgments": [
{
"names": [
"\u003ca href=\"https://twitter.com/hoangnx99\"\u003enxhoang99\u003c/a\u003e with \u003ca href=\"https://lab.viettelcybersecurity.com/\"\u003eVCSLab of Viettel Cyber Security\u003c/a\u003e"
]
}
],
"aggregate_severity": {
"namespace": "https://www.microsoft.com/en-us/msrc/security-update-severity-rating-system",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
},
{
"category": "general",
"text": "Not required. The vulnerability documented by this CVE requires no customer action to resolve.",
"title": "Customer Action"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53792 Azure Portal Elevation of Privilege Vulnerability - HTML",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53792"
},
{
"category": "self",
"summary": "CVE-2025-53792 Azure Portal Elevation of Privilege Vulnerability - CSAF",
"url": "https://msrc.microsoft.com/csaf/advisories/2025/msrc_cve-2025-53792.json"
},
{
"category": "external",
"summary": "Microsoft Exploitability Index",
"url": "https://www.microsoft.com/en-us/msrc/exploitability-index?rtc=1"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Azure Portal Elevation of Privilege Vulnerability",
"tracking": {
"current_release_date": "2025-08-07T07:00:00.000Z",
"generator": {
"date": "2025-11-10T00:11:43.023Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-53792",
"initial_release_date": "2025-08-12T07:00:00.000Z",
"revision_history": [
{
"date": "2025-08-07T07:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"category": "product_name",
"name": "Azure Portal",
"product": {
"name": "Azure Portal",
"product_id": "16810"
}
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-53792",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"notes": [
{
"category": "general",
"text": "Microsoft",
"title": "Assigning CNA"
},
{
"category": "faq",
"text": "This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency.\nPlease see Toward greater transparency: Unveiling Cloud Service CVEs for more information.",
"title": "Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?"
}
],
"product_status": {
"fixed": [
"16810"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53792 Azure Portal Elevation of Privilege Vulnerability - HTML",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53792"
},
{
"category": "self",
"summary": "CVE-2025-53792 Azure Portal Elevation of Privilege Vulnerability - CSAF",
"url": "https://msrc.microsoft.com/csaf/advisories/2025/msrc_cve-2025-53792.json"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"exploitCodeMaturity": "UNPROVEN",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"remediationLevel": "OFFICIAL_FIX",
"reportConfidence": "CONFIRMED",
"scope": "UNCHANGED",
"temporalScore": 7.9,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"16810"
]
}
],
"threats": [
{
"category": "impact",
"details": "Elevation of Privilege"
},
{
"category": "exploit_status",
"details": "Publicly Disclosed:No;Exploited:No"
}
],
"title": "Azure Portal Elevation of Privilege Vulnerability"
}
]
}
FKIE_CVE-2025-53792
Vulnerability from fkie_nvd - Published: 2025-08-07 21:15 - Updated: 2025-08-14 17:34
Severity ?
Summary
Azure Portal Elevation of Privilege Vulnerability
References
| URL | Tags | ||
|---|---|---|---|
| secure@microsoft.com | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53792 | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| microsoft | azure_portal | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:azure_portal:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F32E13E9-F5FD-431A-BC3C-0A20D303E1FC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [
{
"sourceIdentifier": "secure@microsoft.com",
"tags": [
"exclusively-hosted-service"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Azure Portal Elevation of Privilege Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios en el portal de Azure"
}
],
"id": "CVE-2025-53792",
"lastModified": "2025-08-14T17:34:08.153",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2,
"source": "secure@microsoft.com",
"type": "Secondary"
}
]
},
"published": "2025-08-07T21:15:28.593",
"references": [
{
"source": "secure@microsoft.com",
"tags": [
"Vendor Advisory"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53792"
}
],
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-285"
}
],
"source": "secure@microsoft.com",
"type": "Secondary"
}
]
}
CERTFR-2025-AVI-0666
Vulnerability from certfr_avis - Published: 2025-08-08 - Updated: 2025-08-08
De multiples vulnérabilités ont été découvertes dans Microsoft Azure. Elles permettent à un attaquant de provoquer une élévation de privilèges.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneReferences
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Azure Portal",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Open AI",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-53767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53767"
},
{
"name": "CVE-2025-53792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53792"
}
],
"initial_release_date": "2025-08-08T00:00:00",
"last_revision_date": "2025-08-08T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0666",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-08T00:00:00.000000"
}
],
"risks": [
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Azure. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Azure",
"vendor_advisories": [
{
"published_at": "2025-08-07",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-53767",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53767"
},
{
"published_at": "2025-08-07",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-53792",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53792"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…