Impact
This vulnerability is a server‑side request forgery that permits an attacker to hijack the Azure Cloud Shell environment and gain elevated privileges across the network. By manipulating internal HTTP requests, the attacker can act with higher authority than intended, potentially accessing resources beyond the original scope of the shell session. The attack hinges on the CWE‑918 weakness in input handling and originates from the frontend service that forwards external requests internally.
Affected Systems
Microsoft Azure Cloud Shell is impacted. The CVE applies to all product releases of this service; version specifics are not enumerated in the official guidance, so any instance of Azure Cloud Shell should be treated as vulnerable until a patch is applied.
Risk and Exploitability
The CVSS vector gives a maximum score of 10, indicating critical severity. EPSS indicates a very low probability of exploitation, but the lack of a known public exploit and its absence from the CISA KEV list mean that the exposure is currently low to moderate. The likely attack path requires (or is inferred to require) an unauthorized user gaining access to a Cloud Shell session or being able to inject crafted requests, after which the SSRF enables privilege escalation. Immediate remediation is essential to eliminate this high‑severity vector.
OpenCVE Enrichment