Kaspersky ID:
KLA51716
Bulunma tarihi:
08/08/2023
Yüklendi:
01/28/2026

Açıklama

Multiple vulnerabilities were found in Microsoft Azure. Malicious users can exploit these vulnerabilities to spoof user interface, bypass security restrictions, gain privileges, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. A spoofing vulnerability in Azure Apache Oozie can be exploited remotely to spoof user interface.
  2. A spoofing vulnerability in Azure Apache Ambari can be exploited remotely to spoof user interface.
  3. A spoofing vulnerability in Azure DevOps Server can be exploited remotely to spoof user interface.
  4. A spoofing vulnerability in Azure Apache Hive can be exploited remotely to spoof user interface.
  5. An elevation of privilege vulnerability in Azure Arc-Enabled Servers can be exploited remotely to gain privileges.
  6. A spoofing vulnerability in Azure HDInsight Jupyter Notebook can be exploited remotely to spoof user interface.
  7. A spoofing vulnerability in Azure Apache Hadoop can be exploited remotely to spoof user interface.
  8. An information disclosure vulnerability can be exploited remotely to obtain sensitive information.

Orijinal öneriler

Kötüye kullanma

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

İlgili ürünler

CVE Listesi

  • CVE-2023-20569
    warning
  • CVE-2023-36877
    warning
  • CVE-2023-36881
    warning
  • CVE-2023-36869
    high
  • CVE-2023-35393
    warning
  • CVE-2023-38176
    high
  • CVE-2023-35394
    warning
  • CVE-2023-38188
    warning

KB Listesi

Daha fazlasını okuyun

Bölgenizde yayılan güvenlik açıklarının istatistiklerini öğrenin statistics.securelist.com

Bu güvenlik açığının açıklamasında bir tutarsızlık mı tespit ettiniz? Bize bildirin!
Kaspersky IT Security Calculator
Daha fazla bilgi edin
Yeni Kaspersky!
Dijital hayatınız güçlü korumayı hak ediyor!
Daha fazla bilgi edin
Do you want to save your changes?
Your message has been sent successfully.