Source |
Cyble |
Identifiant |
8648770 |
Date de publication |
2025-02-17 14:35:56 (vue: 2025-02-17 15:08:09) |
Titre |
CVE-2025-21415 & CVE-2025-21396: Microsoft Addresses Critical Security Risks |
Texte |
Cloud-based platforms and AI-driven services continue to remain in the crosshairs of rapidly evolving malware. Recently, Microsoft released a security advisory addressing two critical vulnerabilities affecting Azure AI Face Service (CVE-2025-21415) and Microsoft Account (CVE-2025-21396).
These flaws could allow attackers to escalate privileges under specific conditions, leading to unauthorized access and system compromise. Given the increasing reliance on AI and cloud technologies, understanding these vulnerabilities and their implications is crucial for organizations and security professionals.
Overview of the Vulnerabilities
Microsoft identified and patched two security vulnerabilities that could have led to privilege escalation:
1. CVE-2025-21396 (Microsoft Account Elevation of Privilege Vulnerability)
Severity Score: 7.5 (CVSS)
Cause: Missing authorization checks in Microsoft Accounts.
Risk: An unauthorized attacker could exploit this flaw to elevate privileges over a network.
Discovery: Reported by security researcher Sugobet.
2. CVE-2025-21415 (Azure AI Face Service Elevation of Privilege Vulnerability)
Severity Score: 9.9 (CVSS)
|
Notes |
★★★
|
Envoyé |
Oui |
Condensat |
022025 1024x512 1259 2025 21396 21396: 21415 300x150 abnormal about access accordance account accounts action actions activities addressed addresses addressing adopt adopting advisories advisory affected affecting allow also anonymous applications applied apply approach are assets associated attack attacker attackers attacks audits: authentication authorization authorized aware awareness azure based become been best blogs breaches broader businesses bypass can caption= cause: challenges checks cloud collaborative com/update com/wp commitment company compliance compromise compromising concept conclusion conditions conduct conducting confirm confirmed confirming content/uploads/2025/02/cyble continue continuous continuously contributes control controls could critical crosshairs crucial culture customer cve cvss cybersecurity cyble data detect detection digital directly disclosure disclosures discovered discovery discovery: driven effort efforts elevate elevated elevation emphasized emphasizes enable enforce enhance ensure ensuring environments escalate escalation escalation: ever evolving executes existence exploit exploitability exploitation exploiting exploits face feasibility file= flaw flaws fostering frameworks fully further future gain gaining given growing guide/vulnerability/cve has have highlight highlights however https://cyble https://msrc https://www id=ma identified identify image impact implementing implications importance improve include: increasing increasingly indicate industry information informed infrastructure issues its jpg large lead leading learn led leverage longer making malicious malware management matters may measures mechanisms medium microsoft minimize missing mitigate mitigated mitigating mitigation mitigations model: monitor monitoring more must must: my/portal/advisory mycert nature necessary network open openly org organizations over overview pam partners patched patches permissions platforms poc policies pose potential potentially practices precautions precedent present prevalent prevent prioritizing priority privilege privileged privileges proactive proactively professionals promptly proof protect providers rapid rapidly real recently recommended refine regular released reliance relying remain remains remediate reported required researcher resilience resolved response restrict risk risk: risks safeguard safety scale score: security security: sensitive service services sets severity sharing should source: specific spoofing stating: stay staying strict strong sugobet swift system systems take target targeting technologies that: these threat threats time title= to: tools: transparency trust two unauthorized under underlines underscore understand understanding updates: user users using vigilant vital vulnerabilities vulnerability why will within zero “by |
Tags |
Malware
Tool
Vulnerability
Threat
Cloud
|
Stories |
|
Move |
|