Description
Improper authorization in Microsoft Azure Kubernetes Service allows an unauthorized attacker to elevate privileges over a network.
Published: 2026-04-02
Score: 10 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Apply Patch
AI Analysis

Impact

Microsoft Azure Kubernetes Service contains an authorization flaw that lets an unauthenticated or low-privileged attacker increase their access rights within the cluster. This improper authorization can enable the attacker to perform higher-level actions, compromise cluster resources, and potentially expose sensitive data, as the failure involves both authentication weaknesses and privilege escalation mechanisms.

Affected Systems

Microsoft Azure Kubernetes Service instances are affected. Specific versions are not listed in the advisory, so all current deployments with the identified flaw should be considered vulnerable until a patch is applied.

Risk and Exploitability

The vulnerability receives a CVSS score of 10, indicating critical severity. The EPSS score is under 1%, suggesting a low likelihood of widespread exploitation at present, and it has not been recorded in the CISA KEV catalog. Based on the description, the likely attack vector requires network access to the AKS API or cluster control plane; the flaw relies on improper authorization checks within that network context.

Generated by OpenCVE AI on April 6, 2026 at 16:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Azure Kubernetes Service update as detailed in the Microsoft security advisory
  • Review and tighten RBAC policies to enforce least privilege across the cluster
  • Restrict network access to the AKS API server using Network Security Groups or firewall rules
  • Monitor audit logs for any unauthorized changes to roles or permissions
  • If immediate patching is not possible, minimize privileged role assignments until an official fix is deployed

Generated by OpenCVE AI on April 6, 2026 at 16:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 06 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-863
CPEs cpe:2.3:a:microsoft:azure_kubernetes_service:-:*:*:*:*:*:*:*

Fri, 03 Apr 2026 14:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 03 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Description Improper authorization in Microsoft Azure Kubernetes Service allows an unauthorized attacker to elevate privileges over a network.
Title Microsoft Azure Kubernetes Service Elevation of Privilege Vulnerability
First Time appeared Microsoft
Microsoft azure Kubernetes Service
Weaknesses CWE-285
CPEs cpe:2.3:a:microsoft:azure_kubernetes_service:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft azure Kubernetes Service
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Azure Kubernetes Service
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-30T14:42:47.608Z

Reserved: 2026-03-17T20:15:23.719Z

Link: CVE-2026-33105

cve-icon Vulnrichment

Updated: 2026-04-03T12:53:06.017Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-03T00:16:05.040

Modified: 2026-04-06T13:48:48.337

Link: CVE-2026-33105

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T07:55:18Z

Weaknesses