Description
Permissive regular expression in Azure Compute Gallery allows an authorized attacker to elevate privileges locally.
Published: 2026-03-05
Score: 6.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Elevation of Privilege
Action: Apply Patch
AI Analysis

Impact

The vulnerability resides in a permissive regular expression used by Azure Compute Gallery, which can be exploited by an authorized attacker with local access to elevate privileges within the Microsoft ACI Confidential Containers environment. The flaw is classified under CWE‑625, allowing an attacker to execute privileged actions that were not intended for them. As a result, the attacker could potentially gain higher privileges, execute arbitrary code, or modify resources, compromising confidentiality, integrity, and availability of the container environment.

Affected Systems

This issue affects Microsoft ACI Confidential Containers as distributed by Microsoft. No specific product version is provided in the advisory, so any deployment that includes this component remains potentially vulnerable until a patch is applied. System administrators should review the installed version against the Microsoft Security Update Guide linked in the advisory to confirm exposure.

Risk and Exploitability

The CVSS base score is 6.7, indicating a medium severity risk, and the EPSS score is below 1 %, suggesting a low probability of exploitation at the time of analysis. The vulnerability is not listed in the CISA KEV catalog, so there is no confirmed active exploitation. Attachment is limited to users who have authorized access to Azure Compute Gallery, so the attack requires local or privileged context; the lack of remote attack vectors reduces overall risk, but the potential impact of privilege escalation warrants timely remediation.

Generated by OpenCVE AI on April 15, 2026 at 15:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any Microsoft security update for ACI Confidential Containers that addresses the regular expression flaw, as listed in the Microsoft Security Update Guide reference.
  • Restrict roles and permissions for users and services that can create or modify gallery artifacts, ensuring they only have the minimum required rights.
  • If an update is not yet available, disable or limit the use of the Azure Compute Gallery feature that enables the permissive regex until a fix can be applied.

Generated by OpenCVE AI on April 15, 2026 at 15:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 16 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft aci Confidential Containers
Weaknesses NVD-CWE-Other
CPEs cpe:2.3:a:microsoft:aci_confidential_containers:-:*:*:*:*:*:*:*
Vendors & Products Microsoft aci Confidential Containers

Mon, 09 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 05 Mar 2026 22:45:00 +0000

Type Values Removed Values Added
Description Permissive regular expression in Azure Compute Gallery allows an authorized attacker to elevate privileges locally.
Title Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability
First Time appeared Microsoft
Microsoft microsoft Aci Confidential Containers
Weaknesses CWE-625
CPEs cpe:2.3:a:microsoft:microsoft_aci_confidential_containers:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft microsoft Aci Confidential Containers
References
Metrics cvssV3_1

{'score': 6.7, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C'}


Subscriptions

Microsoft Aci Confidential Containers Microsoft Aci Confidential Containers
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-14T16:36:19.636Z

Reserved: 2026-01-14T16:59:33.462Z

Link: CVE-2026-23651

cve-icon Vulnrichment

Updated: 2026-03-09T18:20:53.648Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-05T23:16:19.673

Modified: 2026-03-16T15:40:35.150

Link: CVE-2026-23651

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T17:00:07Z

Weaknesses