Sonntag, Dezember 3, 2023
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions
Liga Technews
No Result
View All Result
  • Home
  • Marketing Tech
    • Artificial Intelligence
    • Cybersecurity
    • Blockchain and Crypto
    • Business Automation
  • Apps
  • Digital Transformation
  • Internet of Things
  • SaaS
  • Tech Investments
  • Contact Us
Liga Technews
No Result
View All Result
Newly Found „By-Design“ Flaw in Microsoft Azure Might Expose Storage Accounts to Hackers

Newly Found „By-Design“ Flaw in Microsoft Azure Might Expose Storage Accounts to Hackers

admin by admin
April 11, 2023
in Cybersecurity
0 0
0
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter


Apr 11, 2023Ravie LakshmananCloud Safety / Information Safety

Microsoft Azure

A „by-design flaw“ uncovered in Microsoft Azure might be exploited by attackers to realize entry to storage accounts, transfer laterally within the surroundings, and even execute distant code.

„It’s attainable to abuse and leverage Microsoft Storage Accounts by manipulating Azure Features to steal access-tokens of upper privilege identities, transfer laterally, probably entry important enterprise property, and execute distant code (RCE),“ Orca mentioned in a brand new report shared with The Hacker Information.

The exploitation path that underpins this assault is a mechanism known as Shared Key authorization, which is enabled by default on storage accounts.

In line with Microsoft, Azure generates two 512-bit storage account entry keys when making a storage account. These keys can be utilized to authorize entry to knowledge through Shared Key authorization, or through SAS tokens which can be signed with the shared key.

„Storage account entry keys present full entry to the configuration of a storage account, in addition to the info,“ Microsoft notes in its documentation. „Entry to the shared key grants a person full entry to a storage account’s configuration and its knowledge.“

The cloud safety agency mentioned these entry tokens will be stolen by manipulating Azure Features, probably enabling a menace actor with entry to an account with Storage Account Contributor role to escalate privileges and take over methods.

Particularly, ought to a managed identity be used to invoke the Perform app, it might be abused to execute any command. This, in flip, is made attainable owing to the truth that a devoted storage account is created when deploying an Azure Perform app.

„As soon as an attacker locates the storage account of a Perform app that’s assigned with a robust managed identification, it might run code on its behalf and in consequence purchase a subscription privilege escalation (PE),“ Orca researcher Roi Nisimi mentioned.

UPCOMING WEBINAR

Study to Safe the Identification Perimeter – Confirmed Methods

Enhance what you are promoting safety with our upcoming expert-led cybersecurity webinar: Discover Identification Perimeter methods!

Don’t Miss Out – Save Your Seat!

In different phrases, by exfiltrating the access-token of the Azure Perform app’s assigned managed identification to a distant server, a menace actor can elevate privileges, transfer laterally, entry new assets, and execute a reverse shell on digital machines.

„By overriding perform information in storage accounts, an attacker can steal and exfiltrate a higher-privileged identification and use it to maneuver laterally, exploit and compromise victims‘ most beneficial crown jewels,“ Nisimi defined.

As mitigations, it is really helpful that organizations contemplate disabling Azure Shared Key authorization and utilizing Azure Lively Listing authentication as a substitute. In a coordinated disclosure, Microsoft said it „plans to replace how Features consumer instruments work with storage accounts.“

„This consists of modifications to higher assist eventualities utilizing identification. After identity-based connections for AzureWebJobsStorage are typically out there and the brand new experiences are validated, identification will change into the default mode for AzureWebJobsStorage, which is meant to maneuver away from shared key authorization,“ the tech large additional added.

The findings arrive weeks after Microsoft patched a misconfiguration issue impacting Azure Lively Listing that made it attainable to tamper with Bing search outcomes and a reflected XSS vulnerability in Azure Service Cloth Explorer (SFX) that would result in unauthenticated distant code execution.

Discovered this text attention-grabbing? Observe us on Twitter  and LinkedIn to learn extra unique content material we submit.



Related Posts

Educating applicable use of AI tech – Week in safety with Tony Anscombe
Cybersecurity

Educating applicable use of AI tech – Week in safety with Tony Anscombe

Dezember 3, 2023
Apple patches info-stealing, zero day bugs in iPads and Macs
Cybersecurity

Apple patches info-stealing, zero day bugs in iPads and Macs

Dezember 3, 2023
Assume earlier than you shrink! And our visitor is faked • Graham Cluley
Cybersecurity

Assume earlier than you shrink! And our visitor is faked • Graham Cluley

Dezember 2, 2023
Agent Racoon Backdoor Targets Organizations in Center East, Africa, and U.S.
Cybersecurity

Agent Racoon Backdoor Targets Organizations in Center East, Africa, and U.S.

Dezember 2, 2023
10 Methods B2B firms can enhance cell safety
Cybersecurity

Why you want a Safe Internet Gateway

Dezember 2, 2023
5 methods to handle the manager cyberthreat
Cybersecurity

5 methods to handle the manager cyberthreat

Dezember 2, 2023
Next Post
YouTube’s NFL Sunday Ticket packages begin at $249

YouTube's NFL Sunday Ticket packages begin at $249

Schreibe einen Kommentar Antworten abbrechen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

Neueste Beiträge

  • The right way to extract information from adobe marketing campaign Dezember 3, 2023
  • Tokens and login periods in IBM Cloud Dezember 3, 2023
  • A Complete Money Receipt Course – Robotics & Automation Information Dezember 3, 2023
  • US to Delay Approval of Proposed Crypto Payments till Early 2024 Dezember 3, 2023
  • Amazon is swallowing its pleasure to make sure its web satellites get to orbit on time Dezember 3, 2023

Categories

  • Apps (964)
  • Artificial Intelligence (787)
  • Blockchain and Crypto (3.239)
  • Business Automation (609)
  • Cybersecurity (1.170)
  • Digital Transformation (205)
  • Internet of Things (766)
  • Marketing Tech (469)
  • SaaS (804)
  • Tech Investments (797)

Liga Tech News

Welcome to Liga Tech News The goal of Liga Tech News is to give you the absolute best news sources for any topic! Our topics are carefully curated and constantly updated as we know the web moves fast so we try to as well.

Kategorien

  • Apps
  • Artificial Intelligence
  • Blockchain and Crypto
  • Business Automation
  • Cybersecurity
  • Digital Transformation
  • Internet of Things
  • Marketing Tech
  • SaaS
  • Tech Investments

Recent News

  • The right way to extract information from adobe marketing campaign
  • Tokens and login periods in IBM Cloud
  • A Complete Money Receipt Course – Robotics & Automation Information
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions

© 2023 Liga Tech News | All Rights Reserved

No Result
View All Result
  • Home
  • Marketing Tech
    • Artificial Intelligence
    • Blockchain and Crypto
    • Business Automation
    • Cybersecurity
  • Digital Transformation
  • Apps
  • Internet of Things
  • SaaS
  • Tech Investments
  • Contact Us

© 2023 Liga Tech News | All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In