CVE-2026-23655

6.5 MEDIUM

📋 TL;DR

This vulnerability in Azure Compute Gallery allows cleartext storage of sensitive information, enabling authorized attackers to access and disclose this data over the network. It affects organizations using Azure Compute Gallery with sensitive information stored in gallery artifacts. The risk primarily impacts cloud environments where gallery resources are shared or exposed.

💻 Affected Systems

Products:
  • Azure Compute Gallery
Versions: All versions prior to security update
Operating Systems: N/A - Cloud service
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects configurations where sensitive information is stored in gallery artifacts without proper encryption.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete disclosure of sensitive information including credentials, API keys, or proprietary data stored in gallery artifacts to unauthorized parties, potentially leading to account compromise, data breaches, and regulatory violations.

🟠

Likely Case

Authorized users with gallery access can view sensitive information they shouldn't have access to, leading to internal data exposure and potential privilege escalation within the Azure environment.

🟢

If Mitigated

With proper access controls and encryption, impact is limited to authorized users who already have some level of access to the gallery resources.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authorized access to Azure Compute Gallery. Attack complexity is low once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Latest Azure Compute Gallery service update

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23655

Restart Required: No

Instructions:

1. Update Azure Compute Gallery to latest version via Azure Portal. 2. Ensure all gallery artifacts are encrypted. 3. Review and update access controls for gallery resources.

🔧 Temporary Workarounds

Enable encryption for gallery artifacts

all

Configure encryption for all sensitive information stored in gallery artifacts

az sig gallery-application update --resource-group <RG> --gallery-name <GalleryName> --name <AppName> --enable-encryption true

Restrict gallery access

all

Implement strict RBAC controls to limit who can access gallery resources

az role assignment create --assignee <UserOrGroup> --role 'Reader' --scope $(az sig show --resource-group <RG> --gallery-name <GalleryName> --query id -o tsv)

🧯 If You Can't Patch

  • Remove all sensitive information from gallery artifacts and store in Azure Key Vault or other encrypted storage
  • Implement network security groups to restrict access to gallery endpoints and enable audit logging for all gallery access

🔍 How to Verify

Check if Vulnerable:

Check if sensitive information is stored unencrypted in gallery artifacts: az sig gallery-application show --resource-group <RG> --gallery-name <GalleryName> --name <AppName> --query 'encryptionSettings'

Check Version:

az version --query '"azure-cli"' -o tsv

Verify Fix Applied:

Verify encryption is enabled and no cleartext sensitive data remains: az sig gallery-application show --resource-group <RG> --gallery-name <GalleryName> --name <AppName> --query 'encryptionSettings.enabled'

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to gallery artifacts
  • Multiple failed attempts to access encrypted resources
  • Access from unexpected IP addresses or locations

Network Indicators:

  • Unencrypted data transmission containing sensitive information
  • Traffic to gallery endpoints from unauthorized sources

SIEM Query:

AzureActivity | where OperationNameValue contains "Microsoft.Compute/galleries" and ResultType == "Success" | summarize count() by CallerIpAddress, Caller, TimeGenerated

🔗 References

📤 Share & Export