Description
Heap-based buffer overflow in Azure Linux Virtual Machines allows an authorized attacker to elevate privileges locally.
Published: 2026-03-10
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Local Privilege Escalation
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a heap-based buffer overflow in the Azure Diagnostics extension used by Azure Linux virtual machines. Exploiting this flaw allows an attacker with local or authorized access to overflow a memory buffer, leading to uncontrolled memory writes and the ability to execute arbitrary code with elevated privileges. The attacker can thereby gain root level access on the affected VM, enabling full system compromise, data exfiltration, or pivoting to other resources.

Affected Systems

Microsoft Azure Linux virtual machines equipped with the Azure Diagnostics extension are affected. This includes any Linux‑based VM that has the Azure diagnostics extension installed, regardless of distribution, with the vulnerability present in the default version shipped with Azure. Specific patch versions are not listed, so all VMs running the extension at the time of the advisory are considered vulnerable until patched.

Risk and Exploitability

The CVSS score of 7.8 indicates a serious risk, while the EPSS score of less than 1% suggests a low probability of exploitation in the wild. The vulnerability is not listed in CISA's KEV catalog. Attackers would need local or authorized access to the VM, likely through existing Azure authentication. The heap overflow is exploitable from user space, giving a clear path for privilege escalation within the VM.

Generated by OpenCVE AI on March 20, 2026 at 19:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Azure Diagnostics extension to the latest version recommended by Microsoft on the MSI vulnerability advisory.
  • Verify the extension version after the update and ensure it matches the patched release.
  • If the diagnostics extension is not required for your workloads, consider removing or disabling it to eliminate the attack surface.
  • Regularly review Microsoft security advisories for Azure Linux VMs to stay informed of new patches.

Generated by OpenCVE AI on March 20, 2026 at 19:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Mar 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft linux Diagnostic Extension
CPEs cpe:2.3:a:microsof:linux_diagnostic_extension:*:*:*:*:*:*:*:* cpe:2.3:a:microsoft:linux_diagnostic_extension:*:*:*:*:*:*:*:*
Vendors & Products Microsof
Microsof linux Diagnostic Extension
Microsoft linux Diagnostic Extension

Wed, 18 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Microsof
Microsof linux Diagnostic Extension
Weaknesses CWE-787
CPEs cpe:2.3:a:microsof:linux_diagnostic_extension:*:*:*:*:*:*:*:*
Vendors & Products Microsof
Microsof linux Diagnostic Extension

Tue, 10 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
Description Heap-based buffer overflow in Azure Linux Virtual Machines allows an authorized attacker to elevate privileges locally.
Title Linux Azure Diagnostic extension (LAD) Elevation of Privilege Vulnerability
First Time appeared Microsoft
Microsoft azure Linux Virtual Machines Azure Diagnostics
Weaknesses CWE-122
CPEs cpe:2.3:a:microsoft:azure_linux_virtual_machines_azure_diagnostics:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft azure Linux Virtual Machines Azure Diagnostics
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Azure Linux Virtual Machines Azure Diagnostics Linux Diagnostic Extension
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-03-27T22:33:13.136Z

Reserved: 2026-01-14T16:59:33.464Z

Link: CVE-2026-23665

cve-icon Vulnrichment

Updated: 2026-03-10T18:00:09.031Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-10T18:18:14.690

Modified: 2026-03-20T18:33:39.940

Link: CVE-2026-23665

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T09:55:36Z

Weaknesses