Security News > 2022 > May > Microsoft releases fixes for Azure flaw allowing RCE attacks
Microsoft has released security updates to address a security flaw affecting Azure Synapse and Azure Data Factory pipelines that could let attackers execute remote commands across Integration Runtime infrastructure.
The Integration Runtime compute infrastructure is used by Azure Synapse and Azure Data Factory pipelines to provide data integration capabilities across network environments package execution).
"The vulnerability was found in the third-party ODBC data connector used to connect to Amazon Redshift, in Integration Runtime in Azure Synapse Pipelines, and Azure Data Factory," Microsoft explained in a security advisory published today.
"Customers using Azure Data Factory can enable Azure integration runtimes with a Managed Virtual Network."
In March, Microsoft said it fixed another Azure security vulnerability in December that enabled attackers to take complete control over other Azure customers' data by abusing an Azure Automation service bug dubbed AutoWarp.
Other Microsoft Azure flaws fixed by Redmond during the last year include ones found in Azure Cosmos DB, the Open Management Infrastructure software agent, and the Azure App Service.
News URL
Related news
- Critical Ivanti RCE flaw with public exploit now used in attacks (source)
- DOJ, Microsoft seize 107 domains used in Russia's Star Blizzard phishing attacks (source)
- Microsoft and DOJ disrupt Russian FSB hackers' attack infrastructure (source)
- New scanner finds Linux, UNIX servers exposed to CUPS RCE attacks (source)
- Microsoft issues 117 patches – some for flaws already under attack (source)
- Microsoft Detects Growing Use of File Hosting Services in Business Email Compromise Attacks (source)
- CISA says critical Fortinet RCE flaw now exploited in attacks (source)
- Microsoft: Ransomware Attacks Growing More Dangerous, Complex (source)
- Microsoft creates fake Azure tenants to pull phishers into honeypots (source)
- Microsoft SharePoint RCE flaw exploits in the wild – you've had 3 months to patch (source)