Kaspersky ID:
KLA51716
Fecha de detección:
08/08/2023
Actualizado:
01/28/2026

Descripción

Multiple vulnerabilities were found in Microsoft Azure. Malicious users can exploit these vulnerabilities to spoof user interface, bypass security restrictions, gain privileges, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. A spoofing vulnerability in Azure Apache Oozie can be exploited remotely to spoof user interface.
  2. A spoofing vulnerability in Azure Apache Ambari can be exploited remotely to spoof user interface.
  3. A spoofing vulnerability in Azure DevOps Server can be exploited remotely to spoof user interface.
  4. A spoofing vulnerability in Azure Apache Hive can be exploited remotely to spoof user interface.
  5. An elevation of privilege vulnerability in Azure Arc-Enabled Servers can be exploited remotely to gain privileges.
  6. A spoofing vulnerability in Azure HDInsight Jupyter Notebook can be exploited remotely to spoof user interface.
  7. A spoofing vulnerability in Azure Apache Hadoop can be exploited remotely to spoof user interface.
  8. An information disclosure vulnerability can be exploited remotely to obtain sensitive information.

Notas informativas originales

Explotación

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Productos relacionados

Lista CVE

  • CVE-2023-20569
    warning
  • CVE-2023-36877
    warning
  • CVE-2023-36881
    warning
  • CVE-2023-36869
    high
  • CVE-2023-35393
    warning
  • CVE-2023-38176
    high
  • CVE-2023-35394
    warning
  • CVE-2023-38188
    warning

Lista KB

Leer más

Conozca las estadísticas de las vulnerabilidades que se propagan en su región statistics.securelist.com

¿Has encontrado algún error en la descripción de esta vulnerabilidad? ¡Háznoslo saber!
Kaspersky Next:
ciberseguridad redefinida
Leer más
Nuevo Kaspersky
¡Su vida digital merece una protección completa!
Leer más
Do you want to save your changes?
Your message has been sent successfully.