{"id":92906,"date":"2025-05-11T14:14:07","date_gmt":"2025-05-11T14:14:07","guid":{"rendered":"https:\/\/www.europesays.com\/uk\/92906\/"},"modified":"2025-05-11T14:14:07","modified_gmt":"2025-05-11T14:14:07","slug":"critical-10-10-microsoft-cloud-security-vulnerability-confirmed","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/uk\/92906\/","title":{"rendered":"Critical 10\/10 Microsoft Cloud Security Vulnerability Confirmed"},"content":{"rendered":"<p class=\"color-body light-text\" role=\"button\">Microsoft confirms 10\/10 Azure vulnerability.<\/p>\n<p>SOPA Images\/LightRocket via Getty Images<\/p>\n<p>Update, May 11, 2025: This story, originally published May 9, has been updated with more details on the move towards greater cloud Common Vulnerabilities and Exposures (CVE) transparency by both Microsoft and Google.<\/p>\n<p>It\u2019s not often that a truly <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/07\/critical-google-chrome-136-audio-bug-lets-hackers-remotely-install-malware\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/07\/critical-google-chrome-136-audio-bug-lets-hackers-remotely-install-malware\/\" target=\"_self\" aria-label=\"critical\" rel=\"noopener\">critical<\/a> security vulnerability emerges that hits the maximum Common Vulnerability Scoring System severity rating of 10. This is one of those times.<\/p>\n<p>Microsoft has confirmed <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/04\/20\/587-windows-vulnerabilities---a-microsoft-security-record-breaker\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/04\/20\/587-windows-vulnerabilities---a-microsoft-security-record-breaker\/\" target=\"_self\" aria-label=\"multiple vulnerabilities\" rel=\"noopener\">multiple vulnerabilities<\/a> rated as critical and impacting core cloud services, one of which has reached the unwelcome heights of that 10\/10 criticality rating. The good news is that none are known to have been <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/03\/27\/windows-passwords-at-risk-as-new-0-day-confirmed-act-now\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/03\/27\/windows-passwords-at-risk-as-new-0-day-confirmed-act-now\/\" target=\"_self\" aria-label=\"exploited in the wild\" rel=\"noopener\">exploited in the wild<\/a>, none have already been publicly disclosed, and as a user, there\u2019s nothing you need to do to protect your environment.<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-4\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/11\/dark-web-alert---29-billion-passwords-14-million-credit-cards-stolen\/\" target=\"_blank\" aria-label=\"Dark Web Alert \u2014 2.9 Billion Passwords, 14 Million Credit Cards Stolen\" rel=\"noopener noreferrer\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/11\/dark-web-alert---29-billion-passwords-14-million-credit-cards-stolen\/\">ForbesDark Web Alert \u2014 2.9 Billion Passwords, 14 Million Credit Cards StolenBy Davey Winder<\/a><br \/>\nCritical Security Vulnerabilities Impacting Core Microsoft Cloud Services<\/p>\n<p>A total of four cloud security vulnerabilities have been confirmed by Microsoft, one of which hit the 10\/10 rating, but two aren\u2019t a million miles short, both being given 9.9 ratings. The final vulnerability remains critical, with a CVSS severity rating of 9.1. Let\u2019s look at them in order of their criticality.<\/p>\n<p><a class=\"color-link\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-29813\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-29813\" aria-label=\"CVE-2025-29813\">CVE-2025-29813<\/a> <br \/>Critical Rating: 10.0<br \/>Azure DevOps Elevation of Privilege Vulnerability<\/p>\n<p>Microsoft confirmed that this Azure DevOps pipeline token hijacking vulnerability is caused by an issue whereby Visual Studio improperly handles the pipeline job tokens, enabling an attacker to potentially extend their access to a project. \u201cTo exploit this vulnerability,\u201d Microsoft said, \u201can attacker would first have to have access to the project and swap the short-term token for a long-term one.\u201d<\/p>\n<p><a class=\"color-link\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-29972\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-29972\" aria-label=\"CVE-2025-29972\">CVE-2025-29972<\/a><br \/>Critical Rating: 9.9<br \/>Azure Storage Resource Provider Spoofing Vulnerability<\/p>\n<p>Microsoft said that this Azure server-side request forgery vulnerability could allow an authorized attacker to perform \u201cspoofing\u201d over a network. In other words, a successful threat actor could exploit this vulnerability to distribute malicious requests that impersonate legitimate services and users.<\/p>\n<p><a class=\"color-link\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-29827\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-29827\" aria-label=\"CVE-2025-29827\">CVE-2025-29827<\/a><br \/>Critical Rating: 9.9<br \/>Azure Automation Elevation of Privilege Vulnerability<\/p>\n<p>Yet another Azure security vulnerability with an unbelievably high official severity rating of 9.9, this time enabling a successful hacker to elevate privileges across the network thanks to an improper authorization issue in Azure Automation.<\/p>\n<p><a class=\"color-link\" href=\"https:\/\/CVE-2025-47733 https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-47733 Critical Rating: 9.1 Microsoft Power Apps Information Disclosure Vulnerability  Hooray, not Azure this time, and dropping on the criticality rating scale to a 9.1 as well. This vulnerability, as the name suggests, would allow an attacker to disclose information over the network. It\u2019s another server-side request forgery vulnerability but this time impacting Microsoft Power Apps.\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/CVE-2025-47733 https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-47733 Critical Rating: 9.1 Microsoft Power Apps Information Disclosure Vulnerability  Hooray, not Azure this time, and dropping on the criticality rating scale to a 9.1 as well. This vulnerability, as the name suggests, would allow an attacker to disclose information over the network. It\u2019s another server-side request forgery vulnerability but this time impacting Microsoft Power Apps.\" aria-label=\"CVE-2025-47733\">CVE-2025-47733<\/a><br \/>Critical Rating: 9.1<br \/>Microsoft Power Apps Information Disclosure Vulnerability<\/p>\n<p>Hooray, not Azure this time, and dropping on the criticality rating scale to a 9.1 as well. This vulnerability, as the name suggests, would allow an attacker to disclose information over the network. It\u2019s another server-side request forgery vulnerability but this time impacting Microsoft Power Apps.<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-5\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/11\/beware---these-ransomware-hackers-are-watching-you-work\/\" target=\"_blank\" aria-label=\"Beware \u2014 These Ransomware Hackers Are Watching You Work\" rel=\"noopener noreferrer\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/11\/beware---these-ransomware-hackers-are-watching-you-work\/\">ForbesBeware \u2014 These Ransomware Hackers Are Watching You WorkBy Davey Winder<\/a><br \/>\nMicrosoft Has Already Protected Your Cloud Environment \u2014 No Action Required<\/p>\n<p>Here\u2019s the really good news among the bad critical vulnerability disclosure stuff: there is no patch to install, no updates to deploy, and no action required by the user at all. \u201cThis vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take,\u201d Microsoft said with regard to each of the cloud security issues mentioned. That\u2019s because it comes under the remit of what the Microsoft Security Response Center refers to as a commitment to provide comprehensive vulnerability information to customers, by detailing cloud service CVEs once they have been patched internally.<\/p>\n<p>A June 27, 2024 announcement, \u201cToward greater transparency: Unveiling Cloud Service CVEs,\u201d confirmed that MSRC was on a continuing mission to protect customers, communities and Microsoft itself from emerging security threats. With cloud-based services now an integral part of everyday life, both business and personal, these cloud service CVEs have taken a much more pivotal position in the security lexicon. \u201cIn the past,\u201d Microsoft said, \u201ccloud service providers refrained from disclosing information about vulnerabilities found and resolved in cloud services, unless customer action was required.\u201d With the value of full transparency now properly understood, all that has changed. \u201cWe will issue CVEs for critical cloud service vulnerabilities,\u201d Microsoft confirmed, \u201cregardless of whether customers need to install a patch or to take other actions to protect themselves.\u201d<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-6\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/08\/fbi-warns-of-router-attacks---is-yours-on-the-list-of-13\/\" target=\"_blank\" aria-label=\"FBI Warns Of Router Attacks \u2014 Is Yours On The List Of 13?\" rel=\"noopener noreferrer\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/08\/fbi-warns-of-router-attacks---is-yours-on-the-list-of-13\/\">ForbesFBI Warns Of Router Attacks \u2014 Is Yours On The List Of 13?By Davey Winder<\/a><\/p>\n<p>No longer is it deemed acceptable, and quite rightly so, that if a customer doesn\u2019t need to install a security update, then there is no value in providing them with any detail of what the security issue was in order for them to maintain a secure defensive posture. \u201cAs our industry matures and increasingly migrates to cloud-based services,\u201d Microsoft said, \u201cwe must be transparent about significant cybersecurity vulnerabilities that are found and fixed.\u201d This aligns with Microsoft\u2019s Secure Future Initiative, which outlines priorities that include implementing new identity protections, enhancing transparency, and ensuring a faster vulnerability response.<\/p>\n<p>Google has also made a move towards a more transparent future regarding cloud CVEs. On November 12, 2024, Google announced it would expand its CVE program so as to issue CVEs for critical Google Cloud vulnerabilities, like Microsoft, even when no customer action or patching is required. \u201dTransparency and shared action, to learn from and mitigate whole classes of vulnerability, is a vital part of countering bad actors,\u201dPhil Venables, Google Cloud\u2019s Chief Information Security Officer, said at the time. It\u2019s good to see that both Google and Microsoft are on the same page when it comes to the importance of full transparency as far as cloud vulnerabilities are concerned. It\u2019s something that can help make all of us feel that little bit more secure.<\/p>\n","protected":false},"excerpt":{"rendered":"Microsoft confirms 10\/10 Azure vulnerability. SOPA Images\/LightRocket via Getty Images Update, May 11, 2025: This story, originally published&hellip;\n","protected":false},"author":2,"featured_media":92907,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[43871,43874,43876,43875,22486,27278,43872,43873,43870,53,16,15],"class_list":{"0":"post-92906","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"tag-azure","9":"tag-cloud-computing-security","10":"tag-cloud-security-warning","11":"tag-cloud-vulnerability","12":"tag-devops","13":"tag-microsoft-azure","14":"tag-microsoft-azure-security","15":"tag-microsoft-azure-vulnerability","16":"tag-microsoft-cloud","17":"tag-technology","18":"tag-uk","19":"tag-united-kingdom"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@uk\/114489620165130558","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/92906","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/comments?post=92906"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/92906\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media\/92907"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media?parent=92906"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/categories?post=92906"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/tags?post=92906"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}