CVE-2026-26122

6.5 MEDIUM

📋 TL;DR

This vulnerability in Microsoft ACI Confidential Containers allows unauthorized information disclosure from containerized workloads. Attackers could potentially access sensitive data from containers that should be isolated. Organizations using Microsoft Azure Confidential Containers are affected.

💻 Affected Systems

Products:
  • Microsoft Azure Confidential Containers
Versions: Specific versions not yet detailed in public advisory
Operating Systems: Linux-based container hosts
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Azure Confidential Containers deployments; standard Azure Container Instances may not be affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of confidential data within containers, including sensitive application data, credentials, or proprietary information that should remain isolated.

🟠

Likely Case

Partial information disclosure where attackers can access some container data but not necessarily all protected information.

🟢

If Mitigated

Minimal impact with proper network segmentation and access controls limiting exposure to trusted entities only.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires some level of access to the container environment; not a simple remote exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Microsoft Security Update Guide for specific patch versions

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26122

Restart Required: Yes

Instructions:

1. Review Microsoft Security Advisory for CVE-2026-26122. 2. Apply the latest security updates for Azure Confidential Containers. 3. Restart affected container instances. 4. Verify container workloads are functioning correctly post-update.

🔧 Temporary Workarounds

Network Isolation

all

Implement strict network policies to limit container communication to only necessary endpoints

az network nsg rule create --resource-group <RG> --nsg-name <NSG> --name deny-untrusted --priority 100 --direction Inbound --access Deny --protocol '*' --source-address-prefixes '*' --source-port-ranges '*' --destination-address-prefixes '*' --destination-port-ranges '*'

Access Control Hardening

all

Restrict RBAC permissions and implement least privilege access to container management interfaces

az role assignment create --role 'Reader' --assignee <user-or-group> --scope <resource-id>

🧯 If You Can't Patch

  • Implement network segmentation to isolate confidential containers from untrusted networks
  • Enable enhanced monitoring and alerting for unusual container access patterns

🔍 How to Verify

Check if Vulnerable:

Check Azure portal for container instance versions and compare against patched versions in Microsoft advisory

Check Version:

az container show --resource-group <RG> --name <container-name> --query 'image'

Verify Fix Applied:

Verify container instances are running updated versions and test container isolation functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual container access patterns
  • Failed authentication attempts to container management APIs
  • Unexpected data egress from containers

Network Indicators:

  • Unusual network traffic between containers
  • Unexpected outbound connections from container instances

SIEM Query:

ContainerLogs | where ContainerGroup == 'confidential-*' | where Message contains 'access' or Message contains 'unauthorized'

🔗 References

📤 Share & Export