Description
Improper neutralization of special elements used in a command ('command injection') in Azure Compute Gallery allows an authorized attacker to elevate privileges locally.
Published: 2026-02-10
Score: 6.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Local Privilege Escalation
Action: Immediate Patch
AI Analysis

Impact

Microsoft ACI Confidential Containers is affected by a command‑injection flaw that allows a user with sufficient authorization to inject malicious commands. The vulnerability arises from improper neutralization of special elements used in a command within Azure Compute Gallery. Exploitation enables an attacker to run arbitrary commands with elevated privileges on the local host, increasing the risk of further compromise or data exposure. This flaw is categorized as a classic command injection weakness (CWE‑77).

Affected Systems

The affected product is Microsoft ACI Confidential Containers, deployed through Azure Compute Gallery. No specific version numbers are listed in the current data, so all installations of this product remain potentially vulnerable until the vendor releases a patched build. Administrators should verify the exact component version and apply the update when available.

Risk and Exploitability

The CVSS base score of 6.7 indicates moderate severity, and the EPSS score of less than 1 % suggests that exploitation is unlikely to occur at the current time. The vulnerability is not listed in the CISA KEV catalog, and no public exploit has been reported. Based on the description, the likely attack vector is local authorization abuse; an attacker would likely need valid credentials or existing access to the Azure Compute Gallery repository to inject commands. Given the need for authenticated interaction, the overall risk to an isolated environment is moderate, but the potential impact of privilege escalation warrants prompt remediation.

Generated by OpenCVE AI on April 15, 2026 at 16:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Microsoft ACI Confidential Containers update provided in the Microsoft security advisory.
  • Configure role‑based access controls to restrict command‑execution capabilities to only trusted administrators, limiting the attack surface for command injection.
  • Validate or sanitize all command inputs in custom scripts or managed configuration templates to eliminate the insertion of shell metacharacters, addressing the underlying CWE‑77 flaw.
  • Monitor audit logs for anomalous command execution and review the integrity of the compute gallery images.

Generated by OpenCVE AI on April 15, 2026 at 16:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 11 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft confidental Containers
Vendors & Products Microsoft confidental Containers

Wed, 11 Feb 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft confcom
CPEs cpe:2.3:a:microsoft:confcom:*:*:*:*:*:azure_cli:*:*
Vendors & Products Microsoft confcom

Tue, 10 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Description Improper neutralization of special elements used in a command ('command injection') in Azure Compute Gallery allows an authorized attacker to elevate privileges locally.
Title Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability
First Time appeared Microsoft
Microsoft microsoft Aci Confidential Containers
Weaknesses CWE-77
CPEs cpe:2.3:a:microsoft:microsoft_aci_confidential_containers:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft microsoft Aci Confidential Containers
References
Metrics cvssV3_1

{'score': 6.7, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C'}


Subscriptions

Microsoft Confcom Confidental Containers Microsoft Aci Confidential Containers
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-10T13:21:16.224Z

Reserved: 2025-12-30T18:10:54.846Z

Link: CVE-2026-21522

cve-icon Vulnrichment

Updated: 2026-02-25T15:43:15.556Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-10T18:16:34.577

Modified: 2026-02-11T18:45:49.650

Link: CVE-2026-21522

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T17:45:10Z

Weaknesses