Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-53767 (GCVE-0-2025-53767)
Vulnerability from cvelistv5 – Published: 2025-08-07 21:01 – Updated: 2026-02-26 17:49 Exclusively Hosted Service
VLAI?
EPSS
Title
Azure OpenAI Elevation of Privilege Vulnerability
Summary
Azure OpenAI Elevation of Privilege Vulnerability
Severity ?
CWE
- CWE-918 - Server-Side Request Forgery (SSRF)
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Microsoft | Azure Open AI |
Affected:
-
|
Date Public ?
2025-08-07 07:00
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-53767",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-13T15:04:00.828666Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-26T17:49:49.050Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Azure Open AI",
"vendor": "Microsoft",
"versions": [
{
"status": "affected",
"version": "-"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:azure_open-AI:*:*:*:*:*:*:*:*",
"versionStartIncluding": "-",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"datePublic": "2025-08-07T07:00:00.000Z",
"descriptions": [
{
"lang": "en-US",
"value": "Azure OpenAI Elevation of Privilege Vulnerability"
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 10,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en-US",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-918",
"description": "CWE-918: Server-Side Request Forgery (SSRF)",
"lang": "en-US",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-13T18:54:59.045Z",
"orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"shortName": "microsoft"
},
"references": [
{
"name": "Azure OpenAI Elevation of Privilege Vulnerability",
"tags": [
"vendor-advisory",
"patch"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53767"
}
],
"tags": [
"exclusively-hosted-service"
],
"title": "Azure OpenAI Elevation of Privilege Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"assignerShortName": "microsoft",
"cveId": "CVE-2025-53767",
"datePublished": "2025-08-07T21:01:02.345Z",
"dateReserved": "2025-07-09T13:25:25.500Z",
"dateUpdated": "2026-02-26T17:49:49.050Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-53767\",\"sourceIdentifier\":\"secure@microsoft.com\",\"published\":\"2025-08-07T21:15:28.007\",\"lastModified\":\"2025-08-14T17:32:03.190\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[{\"sourceIdentifier\":\"secure@microsoft.com\",\"tags\":[\"exclusively-hosted-service\"]}],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Azure OpenAI Elevation of Privilege Vulnerability\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de elevaci\u00f3n de privilegios de Azure OpenAI\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N\",\"baseScore\":10.0,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":5.8}]},\"weaknesses\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-918\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:azure_openai:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1EE6399-239E-479B-A473-B37ECEB110E7\"}]}]}],\"references\":[{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53767\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-53767\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-08-08T16:43:48.262381Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-08-08T16:46:37.905Z\"}}], \"cna\": {\"tags\": [\"exclusively-hosted-service\"], \"title\": \"Azure OpenAI Elevation of Privilege Vulnerability\", \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 10, \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C\"}, \"scenarios\": [{\"lang\": \"en-US\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Microsoft\", \"product\": \"Azure Open AI\", \"versions\": [{\"status\": \"affected\", \"version\": \"-\"}]}], \"datePublic\": \"2025-08-07T07:00:00.000Z\", \"references\": [{\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53767\", \"name\": \"Azure OpenAI Elevation of Privilege Vulnerability\", \"tags\": [\"vendor-advisory\", \"patch\"]}], \"descriptions\": [{\"lang\": \"en-US\", \"value\": \"Azure OpenAI Elevation of Privilege Vulnerability\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en-US\", \"type\": \"CWE\", \"cweId\": \"CWE-918\", \"description\": \"CWE-918: Server-Side Request Forgery (SSRF)\"}]}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:microsoft:azure_open-AI:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"-\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"shortName\": \"microsoft\", \"dateUpdated\": \"2026-02-13T18:54:59.045Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-53767\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-02-13T18:54:59.045Z\", \"dateReserved\": \"2025-07-09T13:25:25.500Z\", \"assignerOrgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"datePublished\": \"2025-08-07T21:01:02.345Z\", \"assignerShortName\": \"microsoft\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
BDU:2025-09637
Vulnerability from fstec - Published: 07.08.2025
VLAI Severity ?
Title
Уязвимость облачной платформы Azure OpenAI, связанная с недостаточной проверкой поступающих запросов, позволяющая нарушителю повысить свои привилегии
Description
Уязвимость облачной платформы Azure OpenAI связана с недостаточной проверкой поступающих запросов. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, повысить свои привилегии
Severity ?
Vendor
Microsoft Corp
Software Name
Azure Open AI
Software Version
- (Azure Open AI)
Possible Mitigations
Установка обновлений из доверенных источников. В связи со сложившейся обстановкой и введенными санкциями против Российской Федерации рекомендуется устанавливать обновления программного обеспечения только после оценки всех сопутствующих рисков.
Компенсирующие меры:
- использование средств межсетевого экранирования для ограничения удалённого доступа к уязвимому программному обеспечению;
- ограничение доступа к уязвимому программному обеспечению, используя схему доступа по «белым спискам»;
- использование систем обнаружения и предотвращения вторжений для обнаружения (выявления, регистрации) и реагирования на попытки эксплуатации уязвимости;
- использование виртуальных частных сетей для организации удаленного доступа (VPN).
Использование рекомендаций:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53767
Reference
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53767
CWE
CWE-918
{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:C/I:C/A:N",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Microsoft Corp",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "- (Azure Open AI)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0423\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0438\u0437 \u0434\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u0445 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u043e\u0432. \u0412 \u0441\u0432\u044f\u0437\u0438 \u0441\u043e \u0441\u043b\u043e\u0436\u0438\u0432\u0448\u0435\u0439\u0441\u044f \u043e\u0431\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u043e\u0439 \u0438 \u0432\u0432\u0435\u0434\u0435\u043d\u043d\u044b\u043c\u0438 \u0441\u0430\u043d\u043a\u0446\u0438\u044f\u043c\u0438 \u043f\u0440\u043e\u0442\u0438\u0432 \u0420\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u043e\u0439 \u0424\u0435\u0434\u0435\u0440\u0430\u0446\u0438\u0438 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0442\u043e\u043b\u044c\u043a\u043e \u043f\u043e\u0441\u043b\u0435 \u043e\u0446\u0435\u043d\u043a\u0438 \u0432\u0441\u0435\u0445 \u0441\u043e\u043f\u0443\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0445 \u0440\u0438\u0441\u043a\u043e\u0432.\n\n\u041a\u043e\u043c\u043f\u0435\u043d\u0441\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u043c\u0435\u0440\u044b:\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432 \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u044d\u043a\u0440\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0434\u043b\u044f \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u043c\u0443 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c\u0443 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044e;\n- \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u043c\u0443 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c\u0443 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044e, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0441\u0445\u0435\u043c\u0443 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043f\u043e \u00ab\u0431\u0435\u043b\u044b\u043c \u0441\u043f\u0438\u0441\u043a\u0430\u043c\u00bb;\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0438 \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0449\u0435\u043d\u0438\u044f \u0432\u0442\u043e\u0440\u0436\u0435\u043d\u0438\u0439 \u0434\u043b\u044f \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f (\u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f, \u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0430\u0446\u0438\u0438) \u0438 \u0440\u0435\u0430\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u043d\u0430 \u043f\u043e\u043f\u044b\u0442\u043a\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438;\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0445 \u0447\u0430\u0441\u0442\u043d\u044b\u0445 \u0441\u0435\u0442\u0435\u0439 \u0434\u043b\u044f \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 (VPN).\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53767",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "07.08.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "13.08.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "11.08.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-09637",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-53767",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Azure Open AI",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u0431\u043b\u0430\u0447\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b Azure OpenAI, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u043e\u0439 \u043f\u043e\u0441\u0442\u0443\u043f\u0430\u044e\u0449\u0438\u0445 \u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0421\u0435\u0440\u0432\u0435\u0440\u043d\u0430\u044f \u0444\u0430\u043b\u044c\u0441\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044f \u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432 (CWE-918)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u0431\u043b\u0430\u0447\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b Azure OpenAI \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u043e\u0439 \u043f\u043e\u0441\u0442\u0443\u043f\u0430\u044e\u0449\u0438\u0445 \u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041f\u043e\u0434\u043c\u0435\u043d\u0430 \u043f\u0440\u0438 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53767",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-918",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 9,4)\n\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 10)"
}
MSRC_CVE-2025-53767
Vulnerability from csaf_microsoft - Published: 2025-08-12 07:00 - Updated: 2025-08-07 07:00Summary
Azure OpenAI Elevation of Privilege Vulnerability
Severity
Critical
Notes
Additional Resources: To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle
Disclaimer: The information provided in the Microsoft Knowledge Base is provided \"as is\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
Customer Action: Not required. The vulnerability documented by this CVE requires no customer action to resolve.
10.0 (Critical)
References
Acknowledgments
<a href="https://www.linkedin.com/in/danielberredo/">Daniel Santos</a> with Microsoft
{
"document": {
"acknowledgments": [
{
"names": [
"\u003ca href=\"https://www.linkedin.com/in/danielberredo/\"\u003eDaniel Santos\u003c/a\u003e with Microsoft"
]
}
],
"aggregate_severity": {
"namespace": "https://www.microsoft.com/en-us/msrc/security-update-severity-rating-system",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
},
{
"category": "general",
"text": "Not required. The vulnerability documented by this CVE requires no customer action to resolve.",
"title": "Customer Action"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53767 Azure OpenAI Elevation of Privilege Vulnerability - HTML",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53767"
},
{
"category": "self",
"summary": "CVE-2025-53767 Azure OpenAI Elevation of Privilege Vulnerability - CSAF",
"url": "https://msrc.microsoft.com/csaf/advisories/2025/msrc_cve-2025-53767.json"
},
{
"category": "external",
"summary": "Microsoft Exploitability Index",
"url": "https://www.microsoft.com/en-us/msrc/exploitability-index?rtc=1"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Azure OpenAI Elevation of Privilege Vulnerability",
"tracking": {
"current_release_date": "2025-08-07T07:00:00.000Z",
"generator": {
"date": "2025-09-17T17:51:59.146Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-53767",
"initial_release_date": "2025-08-12T07:00:00.000Z",
"revision_history": [
{
"date": "2025-08-07T07:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"category": "product_name",
"name": "Azure Open AI",
"product": {
"name": "Azure Open AI",
"product_id": "12286"
}
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-53767",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "general",
"text": "Microsoft",
"title": "Assigning CNA"
},
{
"category": "faq",
"text": "This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency.\nPlease see Toward greater transparency: Unveiling Cloud Service CVEs for more information.",
"title": "Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?"
}
],
"product_status": {
"fixed": [
"12286"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53767 Azure OpenAI Elevation of Privilege Vulnerability - HTML",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53767"
},
{
"category": "self",
"summary": "CVE-2025-53767 Azure OpenAI Elevation of Privilege Vulnerability - CSAF",
"url": "https://msrc.microsoft.com/csaf/advisories/2025/msrc_cve-2025-53767.json"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"exploitCodeMaturity": "UNPROVEN",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"remediationLevel": "OFFICIAL_FIX",
"reportConfidence": "CONFIRMED",
"scope": "CHANGED",
"temporalScore": 8.7,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"12286"
]
}
],
"threats": [
{
"category": "impact",
"details": "Elevation of Privilege"
},
{
"category": "exploit_status",
"details": "Publicly Disclosed:No;Exploited:No"
}
],
"title": "Azure OpenAI Elevation of Privilege Vulnerability"
}
]
}
NCSC-2025-0249
Vulnerability from csaf_ncscnl - Published: 2025-08-13 07:22 - Updated: 2025-08-13 07:22Summary
Kwetsbaarheden verholpen in Azure-producten
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten: Microsoft heeft kwetsbaarheden verholpen in Azure-producten.
Interpretaties: De kwetsbaarheden zijn gerelateerd aan onjuiste toegangscontrolemechanismen, waardoor geautoriseerde aanvallers lokale spoofing-aanvallen kunnen uitvoeren, verhoogde privileges kunnen verkrijgen, gevoelige informatie kunnen onthullen en de integriteit van systemen kunnen compromitteren. Dit kan leiden tot ongeautoriseerde toegang en manipulatie van gevoelige gegevens.
```
Azure Stack:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-53765 | 4.40 | Toegang tot gevoelige gegevens |
| CVE-2025-53793 | 7.50 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Azure OpenAI:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-53767 | 10.00 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Azure Portal:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-53792 | 9.10 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Azure Virtual Machines:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-53781 | 7.70 | Toegang tot gevoelige gegevens |
| CVE-2025-49707 | 7.90 | Voordoen als andere gebruiker |
|----------------|------|-------------------------------------|
Azure File Sync:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-53729 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
```
Oplossingen: Microsoft heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans: medium
Schade: high
CWE-359: Exposure of Private Personal Information to an Unauthorized Actor
CWE-284: Improper Access Control
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE-287: Improper Authentication
CWE-284
- Improper Access Control
CWE-284
- Improper Access Control
CWE-359
- Exposure of Private Personal Information to an Unauthorized Actor
10.0 (Critical)
CWE-200
- Exposure of Sensitive Information to an Unauthorized Actor
9.1 (Critical)
CWE-22
- Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
References
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Microsoft heeft kwetsbaarheden verholpen in Azure-producten.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden zijn gerelateerd aan onjuiste toegangscontrolemechanismen, waardoor geautoriseerde aanvallers lokale spoofing-aanvallen kunnen uitvoeren, verhoogde privileges kunnen verkrijgen, gevoelige informatie kunnen onthullen en de integriteit van systemen kunnen compromitteren. Dit kan leiden tot ongeautoriseerde toegang en manipulatie van gevoelige gegevens.\n```\nAzure Stack: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53765 | 4.40 | Toegang tot gevoelige gegevens | \n| CVE-2025-53793 | 7.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nAzure OpenAI: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53767 | 10.00 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nAzure Portal: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53792 | 9.10 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nAzure Virtual Machines: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53781 | 7.70 | Toegang tot gevoelige gegevens | \n| CVE-2025-49707 | 7.90 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nAzure File Sync: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53729 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n```",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Microsoft heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Exposure of Private Personal Information to an Unauthorized Actor",
"title": "CWE-359"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://portal.msrc.microsoft.com/en-us/security-guidance"
}
],
"title": "Kwetsbaarheden verholpen in Azure-producten",
"tracking": {
"current_release_date": "2025-08-13T07:22:17.432067Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.2"
}
},
"id": "NCSC-2025-0249",
"initial_release_date": "2025-08-13T07:22:17.432067Z",
"revision_history": [
{
"date": "2025-08-13T07:22:17.432067Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/open ai",
"product": {
"name": "vers:unknown/open ai",
"product_id": "CSAFPID-3039718",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:open_ai"
}
}
},
{
"category": "product_version_range",
"name": "vers:unknown/portal",
"product": {
"name": "vers:unknown/portal",
"product_id": "CSAFPID-3039717",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:portal"
}
}
}
],
"category": "product_name",
"name": "Azure"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/1.0.0|\u003c18.3.0.0",
"product": {
"name": "vers:unknown/1.0.0|\u003c18.3.0.0",
"product_id": "CSAFPID-3049136"
}
}
],
"category": "product_name",
"name": "Azure File Sync"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=1.0.0|\u003c18.0.0.0",
"product": {
"name": "vers:unknown/\u003e=1.0.0|\u003c18.0.0.0",
"product_id": "CSAFPID-3049230"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=1.0.0|\u003c18.3.0.0",
"product": {
"name": "vers:unknown/\u003e=1.0.0|\u003c18.3.0.0",
"product_id": "CSAFPID-3049229"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=18.0|\u003c18.0.0.0",
"product": {
"name": "vers:unknown/\u003e=18.0|\u003c18.0.0.0",
"product_id": "CSAFPID-3048954"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=19.0|\u003c19.1.0.0",
"product": {
"name": "vers:unknown/\u003e=19.0|\u003c19.1.0.0",
"product_id": "CSAFPID-3048951"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=20.0|\u003c20.0.0.0",
"product": {
"name": "vers:unknown/\u003e=20.0|\u003c20.0.0.0",
"product_id": "CSAFPID-3048952"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=21.0|\u003c21.2.0.0",
"product": {
"name": "vers:unknown/\u003e=21.0|\u003c21.2.0.0",
"product_id": "CSAFPID-3048953"
}
}
],
"category": "product_name",
"name": "Azure File Sync"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/1.2406.1.23",
"product": {
"name": "vers:microsoft/1.2406.1.23",
"product_id": "CSAFPID-3049184"
}
},
{
"category": "product_version_range",
"name": "vers:microsoft/1.2408.1.50",
"product": {
"name": "vers:microsoft/1.2408.1.50",
"product_id": "CSAFPID-3049183"
}
},
{
"category": "product_version_range",
"name": "vers:microsoft/1.2501.1.47",
"product": {
"name": "vers:microsoft/1.2501.1.47",
"product_id": "CSAFPID-3049182"
}
},
{
"category": "product_version_range",
"name": "vers:microsoft/102.10.2.11",
"product": {
"name": "vers:microsoft/102.10.2.11",
"product_id": "CSAFPID-3049090"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=1.0.0|\u003c102.10.2.11",
"product": {
"name": "vers:unknown/\u003e=1.0.0|\u003c102.10.2.11",
"product_id": "CSAFPID-3049089"
}
}
],
"category": "product_name",
"name": "Azure Stack Hub"
}
],
"category": "product_family",
"name": "Microsoft"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-3049759",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_file_sync:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure File Sync v18"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-3049760",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_file_sync:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure File Sync v19"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-3049761",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_file_sync:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure File Sync v20"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-3049762",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_file_sync:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure File Sync v21"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-3038235",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_open-AI:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure Open AI"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-3038234",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_portal:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure Portal"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-1560226",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_stack_hub:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure Stack Hub"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-3048852",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_stack_hub_2406:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure Stack Hub 2406"
}
],
"category": "product_family",
"name": "Azure"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/n/a",
"product": {
"name": "vers:unknown/n/a",
"product_id": "CSAFPID-3038148"
}
}
],
"category": "product_name",
"name": "Azure Open AI"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/n/a",
"product": {
"name": "vers:unknown/n/a",
"product_id": "CSAFPID-3038150"
}
}
],
"category": "product_name",
"name": "Azure Portal"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/1.0.0|\u003c102.10.2.11",
"product": {
"name": "vers:unknown/1.0.0|\u003c102.10.2.11",
"product_id": "CSAFPID-3048737"
}
}
],
"category": "product_name",
"name": "Azure Stack Hub"
}
],
"category": "vendor",
"name": "Microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-49707",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-49707 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-49707.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.9,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
}
],
"title": "CVE-2025-49707"
},
{
"cve": "CVE-2025-53729",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53729 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53729.json"
}
],
"title": "CVE-2025-53729"
},
{
"cve": "CVE-2025-53765",
"cwe": {
"id": "CWE-359",
"name": "Exposure of Private Personal Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Private Personal Information to an Unauthorized Actor",
"title": "CWE-359"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53765 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53765.json"
}
],
"title": "CVE-2025-53765"
},
{
"cve": "CVE-2025-53767",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53767 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53767.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
}
],
"title": "CVE-2025-53767"
},
{
"cve": "CVE-2025-53781",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53781 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53781.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
}
],
"title": "CVE-2025-53781"
},
{
"cve": "CVE-2025-53792",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"notes": [
{
"category": "other",
"text": "Improper Authorization",
"title": "CWE-285"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53792 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53792.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
}
],
"title": "CVE-2025-53792"
},
{
"cve": "CVE-2025-53793",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53793 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53793.json"
}
],
"title": "CVE-2025-53793"
}
]
}
CERTFR-2025-AVI-0666
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Microsoft Azure. Elles permettent à un attaquant de provoquer une élévation de privilèges.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneReferences
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Azure Portal",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Open AI",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-53767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53767"
},
{
"name": "CVE-2025-53792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53792"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0666",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-08T00:00:00.000000"
}
],
"risks": [
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Azure. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Azure",
"vendor_advisories": [
{
"published_at": "2025-08-07",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-53767",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53767"
},
{
"published_at": "2025-08-07",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-53792",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53792"
}
]
}
CERTFR-2025-AVI-0666
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Microsoft Azure. Elles permettent à un attaquant de provoquer une élévation de privilèges.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneReferences
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Azure Portal",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Open AI",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-53767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53767"
},
{
"name": "CVE-2025-53792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53792"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0666",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-08T00:00:00.000000"
}
],
"risks": [
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Azure. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Azure",
"vendor_advisories": [
{
"published_at": "2025-08-07",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-53767",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53767"
},
{
"published_at": "2025-08-07",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-53792",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53792"
}
]
}
FKIE_CVE-2025-53767
Vulnerability from fkie_nvd - Published: 2025-08-07 21:15 - Updated: 2025-08-14 17:32
Severity ?
Summary
Azure OpenAI Elevation of Privilege Vulnerability
References
| URL | Tags | ||
|---|---|---|---|
| secure@microsoft.com | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53767 | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| microsoft | azure_openai | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:azure_openai:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1EE6399-239E-479B-A473-B37ECEB110E7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [
{
"sourceIdentifier": "secure@microsoft.com",
"tags": [
"exclusively-hosted-service"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Azure OpenAI Elevation of Privilege Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios de Azure OpenAI"
}
],
"id": "CVE-2025-53767",
"lastModified": "2025-08-14T17:32:03.190",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.8,
"source": "secure@microsoft.com",
"type": "Secondary"
}
]
},
"published": "2025-08-07T21:15:28.007",
"references": [
{
"source": "secure@microsoft.com",
"tags": [
"Vendor Advisory"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53767"
}
],
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-918"
}
],
"source": "secure@microsoft.com",
"type": "Secondary"
}
]
}
GHSA-6VJ9-H2J2-WMPR
Vulnerability from github – Published: 2025-08-07 21:31 – Updated: 2025-08-07 21:31
VLAI?
Details
Azure OpenAI Elevation of Privilege Vulnerability
Severity ?
10.0 (Critical)
{
"affected": [],
"aliases": [
"CVE-2025-53767"
],
"database_specific": {
"cwe_ids": [
"CWE-918"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-08-07T21:15:28Z",
"severity": "CRITICAL"
},
"details": "Azure OpenAI Elevation of Privilege Vulnerability",
"id": "GHSA-6vj9-h2j2-wmpr",
"modified": "2025-08-07T21:31:08Z",
"published": "2025-08-07T21:31:08Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53767"
},
{
"type": "WEB",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53767"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N",
"type": "CVSS_V3"
}
]
}
Loading…
Show additional events:
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…