Microsoft fixes critical Azure bug that exposed customer data

Photo of author
Written By Chris

Microsoft

Microsoft has addressed a vulnerability within the Azure Automation service that might have allowed attackers to take full management over different Azure clients’ knowledge.

Microsoft Azure Automation Service gives course of automation, configuration administration, and replace administration options, with every scheduled job operating inside remoted sandboxes for every Azure buyer.

The vulnerability, dubbed AutoWarp by Orca Safety’s Cloud Safety Researcher Yanir Tsarimi, who found it, made it attainable for an attacker to steal different Azure clients’ Managed Identities authentication tokens from an inside server that manages the sandboxes of different customers.

“Somebody with malicious intentions may’ve constantly grabbed tokens, and with every token, widen the assault to extra Azure clients,” Yanir Tsarimi mentioned.

“This assault may imply full management over assets and knowledge belonging to the focused account, relying on the permissions assigned by the shopper.

“We found giant firms in danger (together with a worldwide telecommunications firm, two automobile producers, a banking conglomerate, huge 4 accounting corporations, and extra).”

No proof of within the wild exploitation

Azure Automation accounts impacted by this vulnerability embrace these with the Managed Id characteristic enabled (toggled on by default, in keeping with Tsarimi).

“Automation accounts that use an Automation Hybrid employee for execution and/or Automation Run-As accounts for entry to assets weren’t impacted,” Microsoft mentioned.

Microsoft mounted the safety flaw on December 10 by blocking entry to auth tokens to all sandboxes besides the one which had professional entry, 4 days after Tsarimi reported his discovery to the Microsoft Safety Response Heart (MSRC).

The corporate publicly disclosed the vulnerability in the present day, saying that it discovered no proof that Managed Identities tokens had been misused, or AutoWarp exploited in assaults.

Microsoft notified all affected Azure Automation service clients and advisable following the safety greatest practices outlined right here.

Redmond mitigated one other Azure bug in December (named NotLegit) that permit attackers achieve entry to the supply code of shoppers’ Azure internet apps.

Leave a Comment