CVE-2023-36052

8.6 HIGH

📋 TL;DR

CVE-2023-36052 is an information disclosure vulnerability in Azure CLI's REST command that allows authenticated users to access sensitive information from other Azure resources. This affects organizations using Azure CLI with REST commands to manage Azure resources. The vulnerability exposes data that should be restricted by proper authorization checks.

💻 Affected Systems

Products:
  • Azure CLI
Versions: Azure CLI versions prior to 2.53.1
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Azure CLI when using REST commands. Requires authenticated Azure account access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive Azure resource data including configuration details, secrets, and credentials, potentially leading to lateral movement and full cloud environment compromise.

🟠

Likely Case

Unauthorized access to sensitive Azure resource metadata and configuration information, enabling reconnaissance and privilege escalation opportunities.

🟢

If Mitigated

Limited exposure with proper network segmentation and minimal impact if only non-sensitive resources are accessible.

🌐 Internet-Facing: MEDIUM - Requires authenticated access but could be exploited if credentials are compromised or through phishing attacks.
🏢 Internal Only: HIGH - Internal users with Azure CLI access could exploit this to escalate privileges and access unauthorized resources.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to Azure CLI. The vulnerability is in the REST command implementation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Azure CLI 2.53.1 and later

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36052

Restart Required: No

Instructions:

1. Update Azure CLI using: az upgrade --yes 2. Verify version with: az --version 3. Ensure version is 2.53.1 or higher

🔧 Temporary Workarounds

Disable REST command usage

all

Restrict or monitor usage of Azure CLI REST commands in your environment

# Monitor for REST command usage: az rest

Implement least privilege access

all

Apply strict RBAC policies to limit Azure resource access

# Review and restrict Azure role assignments

🧯 If You Can't Patch

  • Implement strict monitoring and alerting for Azure CLI REST command usage
  • Apply network segmentation and restrict Azure CLI access to trusted networks only

🔍 How to Verify

Check if Vulnerable:

Run 'az --version' and check if version is below 2.53.1

Check Version:

az --version

Verify Fix Applied:

Run 'az --version' and confirm version is 2.53.1 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unusual Azure CLI REST command usage patterns
  • Multiple failed authorization attempts followed by REST commands

Network Indicators:

  • Azure CLI traffic to unexpected Azure resource endpoints
  • Unusual volume of REST API calls from user accounts

SIEM Query:

AzureActivity | where OperationNameValue contains 'REST' and Caller contains 'az'

🔗 References

📤 Share & Export