Impact
Microsoft ACI Confidential Containers is affected by a command‑injection flaw that allows a user with sufficient authorization to inject malicious commands. The vulnerability arises from improper neutralization of special elements used in a command within Azure Compute Gallery. Exploitation enables an attacker to run arbitrary commands with elevated privileges on the local host, increasing the risk of further compromise or data exposure. This flaw is categorized as a classic command injection weakness (CWE‑77).
Affected Systems
The affected product is Microsoft ACI Confidential Containers, deployed through Azure Compute Gallery. No specific version numbers are listed in the current data, so all installations of this product remain potentially vulnerable until the vendor releases a patched build. Administrators should verify the exact component version and apply the update when available.
Risk and Exploitability
The CVSS base score of 6.7 indicates moderate severity, and the EPSS score of less than 1 % suggests that exploitation is unlikely to occur at the current time. The vulnerability is not listed in the CISA KEV catalog, and no public exploit has been reported. Based on the description, the likely attack vector is local authorization abuse; an attacker would likely need valid credentials or existing access to the Azure Compute Gallery repository to inject commands. Given the need for authenticated interaction, the overall risk to an isolated environment is moderate, but the potential impact of privilege escalation warrants prompt remediation.
OpenCVE Enrichment