CVE-2025-65037

10.0 CRITICAL

📋 TL;DR

This critical vulnerability in Azure Container Apps allows remote attackers to execute arbitrary code via code injection. Any organization using vulnerable Azure Container Apps configurations is affected, potentially leading to complete system compromise.

💻 Affected Systems

Products:
  • Azure Container Apps
Versions: Specific versions not publicly detailed; all vulnerable configurations prior to patching
Operating Systems: Azure platform
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability affects Azure Container Apps service configurations; exact conditions depend on specific deployment settings.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of Azure Container Apps environment, data exfiltration, lateral movement to other Azure resources, and persistent backdoor installation.

🟠

Likely Case

Unauthorized code execution leading to data theft, service disruption, and potential ransomware deployment.

🟢

If Mitigated

Limited impact due to network segmentation, minimal permissions, and monitoring that detects exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CVSS 10.0 indicates trivial exploitation over network without authentication; Microsoft has not disclosed exploit details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not version-specific; service-side fix deployed by Microsoft

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-65037

Restart Required: No

Instructions:

1. Ensure Azure Container Apps service is updated by Microsoft automatically. 2. Verify no custom configurations reintroduce vulnerability. 3. Monitor Azure Security Center for compliance alerts.

🔧 Temporary Workarounds

Network isolation

all

Restrict network access to Azure Container Apps using NSGs or Azure Firewall

Least privilege access

all

Apply strict RBAC and remove unnecessary permissions from Container Apps

🧯 If You Can't Patch

  • Isolate affected Container Apps in dedicated virtual networks with strict ingress/egress rules
  • Implement application-level monitoring and anomaly detection for suspicious code execution patterns

🔍 How to Verify

Check if Vulnerable:

Check Azure Security Center for vulnerability alerts related to CVE-2025-65037 on your Container Apps resources

Check Version:

Azure CLI: az containerapp show --name <app-name> --resource-group <rg-name> --query 'properties.provisioningState'

Verify Fix Applied:

Verify no active alerts in Azure Security Center and confirm Container Apps are running with latest service updates

📡 Detection & Monitoring

Log Indicators:

  • Unusual process execution in Container Apps logs
  • Unexpected network connections from container instances
  • Authentication failures followed by successful code execution

Network Indicators:

  • Anomalous outbound traffic from Container Apps to unexpected destinations
  • Unusual protocol usage on container network interfaces

SIEM Query:

Azure Sentinel: ContainerAppLogs | where Message contains "code injection" or ProcessName contains suspicious patterns

🔗 References

📤 Share & Export