Descripción
Multiple vulnerabilities were found in Microsoft Azure. Malicious users can exploit these vulnerabilities to spoof user interface, bypass security restrictions, gain privileges.
Below is a complete list of vulnerabilities:
- A spoofing vulnerability in Azure Machine Learning Notebook can be exploited remotely to spoof user interface.
- An elevation of privilege vulnerability in Azure Logic Apps can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Azure Monitor Agent Metrics Extension can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Azure Monitor Agent can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Admin Center in Azure Portal can be exploited remotely to gain privileges.
- A security feature bypass vulnerability in Azure SDK for Java can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Microsoft SSO Plugin for Jira & Confluence can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Azure Connected Machine Agent can be exploited remotely to gain privileges.
Notas informativas originales
- CVE-2026-42823
- CVE-2026-42830
- CVE-2026-32204
- CVE-2026-41086
- CVE-2026-33117
- CVE-2026-41103
- CVE-2026-40381
Productos relacionados
- Microsoft-Windows
- Microsoft-Azure
- Azure-Connected-Machine-Agent
- Azure-Monitor
- Arc-Enabled-Servers-Azure-Connected-Machine-Agent
- Azure-Monitor-Agent
Lista CVE
- CVE-2026-32204 critical
- CVE-2026-33117 critical
- CVE-2026-33833 critical
- CVE-2026-40381 critical
- CVE-2026-41086 critical
- CVE-2026-41103 critical
- CVE-2026-42823 critical
- CVE-2026-42830 high
Leer más
Conozca las estadísticas de las vulnerabilidades que se propagan en su región statistics.securelist.com
¿Has encontrado algún error en la descripción de esta vulnerabilidad? ¡Háznoslo saber!