Description
Improper input validation in Azure Managed Instance for Apache Cassandra allows an authorized attacker to execute code over a network.
Published: 2026-05-07
Score: 9 Critical
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

An input validation flaw in Azure Managed Instance for Apache Cassandra enables an attacker with authorized access to supply crafted network input that the service processes without proper checks. This flaw permits execution of arbitrary code on the instance host, compromising confidentiality, integrity, and availability of the managed database and potentially the underlying virtual machine. The vulnerability falls under CWE-20, Basic Input Validation. Because executing arbitrary code grants full control over the instance, the impact is severe.

Affected Systems

The vulnerability affects Microsoft Azure Managed Instance for Apache Cassandra. No specific product versions are listed, so all currently deployed instances that have not been updated with the Microsoft security update are considered affected. Only instances with the Microsoft security update installed are known to be safe.

Risk and Exploitability

The CVSS base score of 9.0 indicates a critical severity. The EPSS is not available, but the flaw allows remote code execution over the network by an authorized attacker. Since the attack vector is network-based and requires credentials or authorization, the risk is high for organizations that supply users with direct Cassandra access or expose the service outside a protected network. The vulnerability is not listed in the CISA KEV catalog, so no known active exploits have been reported, but the high severity warrants prompt remediation.

Generated by OpenCVE AI on May 7, 2026 at 22:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the Microsoft Azure security update that addresses CVE-2026-33844 as soon as possible.
  • Restrict inbound network traffic to the Cassandra port only to trusted IP ranges or via Azure Private Link.
  • Enable Azure Monitor and configure alerts for unexpected process activity or elevated privileges on the managed instance to detect potential exploitation.

Generated by OpenCVE AI on May 7, 2026 at 22:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 21:30:00 +0000

Type Values Removed Values Added
Description Improper input validation in Azure Managed Instance for Apache Cassandra allows an authorized attacker to execute code over a network.
Title Azure Managed Instance for Apache Cassandra Remote Code Execution Vulnerability
First Time appeared Microsoft
Microsoft azure Managed Instance For Apache Cassandra
Weaknesses CWE-20
CPEs cpe:2.3:a:microsoft:azure_managed_instance_for_apache_cassandra:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft azure Managed Instance For Apache Cassandra
References
Metrics cvssV3_1

{'score': 9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Azure Managed Instance For Apache Cassandra
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-05-07T20:58:52.985Z

Reserved: 2026-03-24T00:52:01.354Z

Link: CVE-2026-33844

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-07T22:16:34.420

Modified: 2026-05-07T22:16:34.420

Link: CVE-2026-33844

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T23:30:40Z

Weaknesses