Description
'.../...//' in Azure Compute Gallery allows an authorized attacker to elevate privileges locally.
Published: 2026-03-05
Score: 6.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Local Privilege Escalation
Action: Patch Now
AI Analysis

Impact

The vulnerability exists in Microsoft Azure ACI Confidential Containers and is identified by path handling in the Azure Compute Gallery. An authorized attacker who can upload or manage container images can supply a string that includes forward‑slash sequences, allowing the attacker to execute a local privilege escalation inside the confidential container and potentially gain the rights of the container worker process; the weakness is categorized as a path traversal problem (CWE‑22) and an unchecked relative reference (CWE‑35), but the exact exploitation mechanism is not described explicitly and is inferred from the CWE tags and brief description.

Affected Systems

Microsoft Azure ACI Confidential Containers across all releases are affected. No specific version numbers or patch identifiers are provided, so any instance of ACI Confidential Containers that has not applied a Microsoft update could be impacted until a vendor fix is installed.

Risk and Exploitability

The CVSS score of 6.7 indicates moderate severity, while the EPSS score below 1% reflects a very low likelihood of observed exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires an attacker to have authorized access to the Azure Compute Gallery, limiting risk to environments where role‑based permissions are weak. If exploited, the attacker can elevate privileges locally within the container, potentially enabling further compromise of the host or other resources.

Generated by OpenCVE AI on April 15, 2026 at 15:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Deploy the latest Microsoft patch for Azure ACI Confidential Containers as released by Microsoft.
  • Limit Azure Compute Gallery access by assigning role‑based permissions only to trusted users or groups that truly need to upload or modify container images.
  • Enforce strict path validation in container image manifests, rejecting any relative or absolute path references that could escape the intended file system boundary, in accordance with CWE‑22 remediation guidelines.

Generated by OpenCVE AI on April 15, 2026 at 15:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 16 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft aci Confidential Containers
Weaknesses CWE-22
CPEs cpe:2.3:a:microsoft:aci_confidential_containers:-:*:*:*:*:*:*:*
Vendors & Products Microsoft aci Confidential Containers

Mon, 09 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
Description Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability '.../...//' in Azure Compute Gallery allows an authorized attacker to elevate privileges locally.

Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft confidental Containers
Vendors & Products Microsoft confidental Containers

Thu, 05 Mar 2026 22:45:00 +0000

Type Values Removed Values Added
Description Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability
Title Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability
First Time appeared Microsoft
Microsoft microsoft Aci Confidential Containers
Weaknesses CWE-35
CPEs cpe:2.3:a:microsoft:microsoft_aci_confidential_containers:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft microsoft Aci Confidential Containers
References
Metrics cvssV3_1

{'score': 6.7, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C'}


Subscriptions

Microsoft Aci Confidential Containers Confidental Containers Microsoft Aci Confidential Containers
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-14T16:36:20.779Z

Reserved: 2026-02-11T15:52:13.911Z

Link: CVE-2026-26124

cve-icon Vulnrichment

Updated: 2026-03-09T20:27:56.621Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-05T23:16:19.990

Modified: 2026-03-16T15:39:27.603

Link: CVE-2026-26124

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T17:00:07Z

Weaknesses