Microsoft Warns Azure Customers of Flaw That Could Let Hackers Access Data

Microsoft warned some of its Azure cloud computing clients {that a} flaw found by safety researchers may have allowed hackers entry to their information.

In a blog post from its safety response group, Microsoft mentioned it had mounted the flaw reported by Palo Alto Networks and it had no proof malicious hackers had abused the approach.

It mentioned it had notified some clients they need to change their login credentials as a precaution.

The weblog put up adopted questions from Reuters in regards to the approach described by Palo Alto. Microsoft didn’t reply any of the questions, together with whether or not it was assured no information had been accessed.

In an earlier interview, Palo Alto researcher Ariel Zelivansky instructed Reuters his group had been capable of escape of Azure’s broadly used system for so-called containers that retailer programmes for customers.

The Azure containers used code that had not been up to date to patch a recognized vulnerability, he mentioned.

As a outcome the Palo Alto group was capable of ultimately get full management of a cluster that included containers from different customers.

“This is the first attack on a cloud provider to use container escape to control other accounts,” mentioned longtime container safety professional Ian Coldwater, who reviewed Palo Alto’s work at Reuters’ request.

Palo Alto reported the difficulty to Microsoft in July. Zelivansky mentioned the trouble had taken his group a number of months and he agreed that malicious hackers most likely had not used an analogous technique in actual assaults.

Still, the report is the second main flaw revealed in Microsoft’s core Azure system in as many weeks. In late August, safety specialists at Wiz described a database flaw that additionally would have allowed one buyer to change one other’s information.

In each instances, Microsoft’s acknowledgment centered on these clients who may need been by some means affected by the researchers themselves, relatively than everybody put in danger by its personal code.

“Out of an abundance of caution, notifications were sent to customers potentially affected by the researcher activities,” Microsoft wrote on Wednesday.

Coldwater mentioned the issue mirrored a failure to use patches in a well timed style, one thing Microsoft has typically blamed its clients for.

“Keeping code updated is really important,” Coldwater mentioned. “A lot of the things that made this attack possible would no longer be possible with modern software.”

Coldwater mentioned that some safety software program utilized by cloud clients would have detected malicious assaults just like the one envisioned by the safety firm, and that logs would additionally present indicators of any such exercise.

The analysis underscored the shared duty between cloud suppliers and clients for safety.

Zelivansky mentioned cloud architectures are usually protected, whereas Microsoft and different cloud suppliers could make fixes themselves, relatively than depend on clients to use updates.

But he famous that cloud assaults by well-funded adversaries, together with nationwide governments, are “a valid concern.”

© Thomson Reuters 2021

You may also like

More in:Technology

Leave a reply

Your email address will not be published. Required fields are marked *