Description
Deserialization of untrusted data in Microsoft Planetary Computer Pro allows an unauthorized attacker to disclose information over a network.
Published: 2026-05-22
Score: 10 Critical
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a flaw in the deserialization of untrusted data within Microsoft Planetary Computer Pro, specifically the GeoCatalog component. By sending crafted serialized objects to the service, an attacker can trigger code that leaks sensitive information. The weakness is a classic insecure deserialization issue classified as CWE‑502, and because the compromised data is transmitted over a network it directly leads to exposure of confidential information to an unauthorized party.

Affected Systems

Microsoft Planetary Computer Pro (GeoCatalog) is the affected product. No specific version ranges are provided in the CNA data, so all installations of this product that include the vulnerable deserialization logic are considered at risk until an update is applied.

Risk and Exploitability

The CVSS score of 10 marks this as critical, indicating a potentially complete compromise of data confidentiality. The EPSS score is not available, which means the current probability of exploitation is unknown, but the lack of listing in the CISA KEV catalog does not diminish the risk posed by a high‑severity flaw. Attackers can deliver malicious payloads over a network to trigger the vulnerability, so the attack vector is inferred to be remote network‑based exploitation.

Generated by OpenCVE AI on May 22, 2026 at 23:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Obtain and install the latest Microsoft update for Planetary Computer Pro that addresses the insecure deserialization flaw.
  • Restrict network access to Planetary Computer Pro endpoints, allowing only trusted IP ranges and secure authentication mechanisms to reduce the attack surface.
  • Implement strict input validation or switch to secure deserialization libraries that reject untrusted data, following CWE‑502 remediation practices.

Generated by OpenCVE AI on May 22, 2026 at 23:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 22 May 2026 22:30:00 +0000

Type Values Removed Values Added
Description Deserialization of untrusted data in Microsoft Planetary Computer Pro allows an unauthorized attacker to disclose information over a network.
Title Microsoft Planetary Computer Pro Information Disclosure Vulnerability
First Time appeared Microsoft
Microsoft planetary Computer Pro
Weaknesses CWE-502
CPEs cpe:2.3:a:microsoft:planetary_computer_pro:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft planetary Computer Pro
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Planetary Computer Pro
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-05-22T22:04:40.238Z

Reserved: 2026-04-16T19:12:36.195Z

Link: CVE-2026-41104

cve-icon Vulnrichment

No data.

cve-icon NVD

No data.

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-22T23:30:03Z

Weaknesses