iTnews
  • Home
  • News
  • Technology
  • Security

Microsoft patched Azure bugs without notifying users, Tenable claims

By Richard Chirgwin on Jun 15, 2022 11:54AM
Microsoft patched Azure bugs without notifying users, Tenable claims

Cloud providers “unaccountable” when it comes to security.

Tenable Security has disclosed two bugs in analytics software Microsoft provides Azure users, and has complained that cloud providers don’t follow industry-standard security disclosure practices.

In its Tenable TechBlog, the company says Microsoft has patched one bug in its Synapse Analytics platform without notifying users, and has left the other unpatched.

Synapse Analytics is a machine learning and data aggregation platform, which runs on Apache Spark with limited permissions, Tenable said in its blog post.

“Tenable Research has discovered a privilege escalation flaw that allows a user to escalate privileges to that of the root user within the context of a Spark VM,” the post explained.

“We have also discovered a flaw that allows a user to poison the hosts file on all nodes in their Spark pool, which allows one to redirect subsets of traffic and snoop on services users generally do not have access to.”

The privilege escalation bug, Tenable wrote, exists because Synapse uses Jupyter notebooks and a script called filesharemount.sh which “happens to contain a handful of flaws that, when combined, can be used to escalate privileges to root”.

The hosts file poisoning bug is far less severe – Tenable describes it as “kinda fun and interesting”, while saying it could have potential to be used “as a critical piece of a greater exploit chain”.

That’s because the bug allows a low-privileged user to overwrite the “hosts” file in their Spark pool.

The privilege escalation bug has been patched with minimal disclosure, Tenable claimed, while the host file poisoning bug remains.

The post said Microsoft’s Synapse engineering team believes the bugs don’t offer cross-tenant attacks, but Tenable believes the vulnerabilities deserve to be rated “critical”.

Disclosure practice criticised

Tenable saves its greatest criticisms for how Microsoft handled the bugs.

Specifically, Tenable complained that it could only get a response from the vendor by discussing the issue on Twitter; that Microsoft patched the privilege escalation bug without contacting Tenable; and that the patch was made silently.

Such behaviour is endemic in cloud security, Tenable said.

As the post stated: “cloud providers rarely provide notice that a security-related flaw was ever present in the first place. 

“Cloud vulnerabilities rarely receive CVEs because they aren’t static products. They are ever-changing beasts with no accountability requirements in terms of notifying users and customers of security-related changes.”

In a separate post on LinkedIn, Tenable chairman and CEO Amit Yoran said: “To date, Microsoft customers have not been notified … This is a repeated pattern of behaviour.”

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
azurecloudcyber securitymicrosoftprivilege escalationsecuritytenable securityvulnerability

Partner Content

Security: Understanding the fundamentals of governance, risk & compliance
Promoted Content Security: Understanding the fundamentals of governance, risk & compliance
Avoiding CAPEX by making on-premise IT more cloud-like
Promoted Content Avoiding CAPEX by making on-premise IT more cloud-like
The Great Resignation has intensified insider security threats
Promoted Content The Great Resignation has intensified insider security threats
How to turn digital complexity into competitive advantage
Promoted Content How to turn digital complexity into competitive advantage

Sponsored Whitepapers

Free eBook: Digital Transformation 101 – for banks
Free eBook: Digital Transformation 101 – for banks
Why financial services need to tackle their Middle Office
Why financial services need to tackle their Middle Office
Learn: The latest way to transfer files between customers
Learn: The latest way to transfer files between customers
Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see

Events

  • Forrester Technology & Innovation Asia Pacific 2022
By Richard Chirgwin
Jun 15 2022
11:54AM
0 Comments

Related Articles

  • Azure misconfiguration exposed ISOC members' info
  • Microsoft warns Azure customers of flaw that could have permitted hackers access to data
  • Azure Cosmos DB remote takeover bug affects thousands of organisations
  • Don't remove PowerShell: US, UK and NZ security agencies
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Aussie Broadband nears end of NBN PoI fibre rollout

Aussie Broadband nears end of NBN PoI fibre rollout

Telstra deregisters 900MHz sites “hindering” Optus 5G rollout

Telstra deregisters 900MHz sites “hindering” Optus 5G rollout

Student details, photos exposed in University of WA data breach

Student details, photos exposed in University of WA data breach

Defence, DEWR drop $160m on Microsoft software, Azure

Defence, DEWR drop $160m on Microsoft software, Azure

Digital Nation

Case Study: Multicloud business drivers at MLC Life Insurance
Case Study: Multicloud business drivers at MLC Life Insurance
Case Study: Swinburne University overhauls student management system
Case Study: Swinburne University overhauls student management system
COVER STORY: Multiple cloud models make security more complex
COVER STORY: Multiple cloud models make security more complex
Personalisation strategies need to be built from the ground up
Personalisation strategies need to be built from the ground up
COVER STORY: What happens when Google changes its algorithm?
COVER STORY: What happens when Google changes its algorithm?
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.