Impact
The vulnerability exists in Microsoft Azure ACI Confidential Containers and is identified by path handling in the Azure Compute Gallery. An authorized attacker who can upload or manage container images can supply a string that includes forward‑slash sequences, allowing the attacker to execute a local privilege escalation inside the confidential container and potentially gain the rights of the container worker process; the weakness is categorized as a path traversal problem (CWE‑22) and an unchecked relative reference (CWE‑35), but the exact exploitation mechanism is not described explicitly and is inferred from the CWE tags and brief description.
Affected Systems
Microsoft Azure ACI Confidential Containers across all releases are affected. No specific version numbers or patch identifiers are provided, so any instance of ACI Confidential Containers that has not applied a Microsoft update could be impacted until a vendor fix is installed.
Risk and Exploitability
The CVSS score of 6.7 indicates moderate severity, while the EPSS score below 1% reflects a very low likelihood of observed exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires an attacker to have authorized access to the Azure Compute Gallery, limiting risk to environments where role‑based permissions are weak. If exploited, the attacker can elevate privileges locally within the container, potentially enabling further compromise of the host or other resources.
OpenCVE Enrichment