Description
Improper neutralization of special elements used in a command ('command injection') in Azure Cloud Shell allows an unauthorized attacker to perform spoofing over a network.
Published: 2026-05-07
Score: 9.6 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Improper neutralization of special elements used in a command enables an unauthorized attacker to inject commands into Azure Cloud Shell. This command injection flaw, identified as CWE-77, can allow the attacker to execute arbitrary shell commands that may be used to spoof network traffic, thereby compromising the integrity and authenticity of communications.

Affected Systems

The vulnerability affects Microsoft Azure Cloud Shell. No specific version information is provided, so all iterations of Azure Cloud Shell that have not been updated with Microsoft’s latest security patch are potentially vulnerable.

Risk and Exploitability

The CVSS score of 9.6 signals a high severity risk, indicating that successful exploitation would provide the attacker with significant control over the affected system. While the EPSS score is not available, the absence of a KEV listing suggests no publicly known exploits yet, but the high intrinsic severity warrants immediate attention. The injection can be performed remotely over the network by any entity able to interact with the Cloud Shell, making the attack vector likely remote attacker via unsecured input.

Generated by OpenCVE AI on May 7, 2026 at 22:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Microsoft security update for Azure Cloud Shell as outlined in the Microsoft Security Response Center advisory.
  • Limit Azure Cloud Shell access by implementing Azure Conditional Access policies and ensuring only authorized users have permissions.
  • Enable diagnostic logging and continually monitor Cloud Shell command activity for anomalous or unauthorized command execution.

Generated by OpenCVE AI on May 7, 2026 at 22:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 08 May 2026 23:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 08 May 2026 20:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:microsoft:azure_cloud_shell:-:*:*:*:*:*:*:*

Thu, 07 May 2026 21:30:00 +0000

Type Values Removed Values Added
Description Improper neutralization of special elements used in a command ('command injection') in Azure Cloud Shell allows an unauthorized attacker to perform spoofing over a network.
Title Azure Cloud Shell Spoofing Vulnerability
First Time appeared Microsoft
Microsoft azure Cloud Shell
Weaknesses CWE-77
CPEs cpe:2.3:a:microsoft:azure_cloud_shell:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft azure Cloud Shell
References
Metrics cvssV3_1

{'score': 9.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Azure Cloud Shell
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-05-09T03:55:54.225Z

Reserved: 2026-04-02T19:21:11.804Z

Link: CVE-2026-35428

cve-icon Vulnrichment

Updated: 2026-05-08T23:00:14.381Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-07T22:16:34.667

Modified: 2026-05-08T20:02:29.777

Link: CVE-2026-35428

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T22:30:36Z

Weaknesses