CVE-2025-59503

10.0 CRITICAL

📋 TL;DR

This critical Server-Side Request Forgery (SSRF) vulnerability in Azure Compute Gallery allows unauthorized attackers to make internal network requests from the vulnerable system, potentially leading to privilege escalation. It affects Azure Compute Gallery deployments where the service can be accessed by attackers. Organizations using Azure Compute Gallery with internet exposure or insufficient network segmentation are at risk.

💻 Affected Systems

Products:
  • Azure Compute Gallery
Versions: All versions prior to the security update
Operating Systems: N/A (cloud service)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Azure Compute Gallery deployments that are accessible to potential attackers. The vulnerability exists in the service implementation itself.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Azure Compute Gallery service, lateral movement to other Azure resources, data exfiltration, and full control over affected cloud infrastructure.

🟠

Likely Case

Unauthorized access to internal Azure services, metadata harvesting, potential privilege escalation within the Azure environment, and data leakage.

🟢

If Mitigated

Limited impact with proper network segmentation, access controls, and monitoring in place, potentially only allowing limited internal reconnaissance.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SSRF vulnerabilities typically have low exploitation complexity once the attack vector is identified. The CVSS 10.0 score suggests trivial exploitation with maximum impact.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Latest Azure Compute Gallery service update (specific version not specified in reference)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59503

Restart Required: No

Instructions:

1. Log into Azure Portal. 2. Navigate to Azure Compute Gallery service. 3. Apply the latest service updates automatically managed by Azure. 4. Verify the service is running the updated version.

🔧 Temporary Workarounds

Network Restriction

all

Restrict network access to Azure Compute Gallery using Azure Network Security Groups or Private Endpoints

az network nsg rule create --resource-group <RG> --nsg-name <NSG> --name DenyInternet --priority 100 --direction Inbound --access Deny --source-address-prefixes Internet --destination-address-prefixes <GalleryIP> --destination-port-ranges *

Access Control

all

Implement strict Azure RBAC controls to limit who can access the Compute Gallery service

az role assignment create --assignee <User/Group> --role 'Reader' --scope /subscriptions/<SubID>/resourceGroups/<RG>/providers/Microsoft.Compute/galleries/<GalleryName>

🧯 If You Can't Patch

  • Isolate Azure Compute Gallery behind Azure Private Link with no public internet access
  • Implement network segmentation and monitor all outbound requests from the Compute Gallery service

🔍 How to Verify

Check if Vulnerable:

Check if your Azure Compute Gallery deployment is running the latest service version via Azure Portal or CLI: az sig show --resource-group <RG> --gallery-name <Name>

Check Version:

az sig show --resource-group <RG> --gallery-name <Name> --query 'provisioningState'

Verify Fix Applied:

Confirm the service has been updated by checking the last update timestamp and ensuring no SSRF attempts are successful in testing

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from Azure Compute Gallery service
  • Requests to internal Azure metadata endpoints (169.254.169.254)
  • Unexpected authentication attempts from Compute Gallery IP

Network Indicators:

  • Outbound connections from Compute Gallery to unexpected internal services
  • HTTP requests with crafted URLs attempting internal resource access

SIEM Query:

AzureDiagnostics | where ResourceProvider == 'MICROSOFT.COMPUTE' and OperationName contains 'Gallery' and httpRequest contains 'internal' or httpRequest contains 'metadata'

🔗 References

📤 Share & Export