Publicly Accessible Azure VM instance has a privileged service account and a critical vulnerability

This page is not yet available in Spanish. We are working on its translation.
If you have any questions or feedback about our current translation project, feel free to reach out to us!

Description

A privileged, publicly accessible Azure VM instance has one or more critical severity vulnerabilities.

A compromise of this VM could lead to potential abuse of the privileges associated with the VM, and could lead to unauthorized access to the account and other resources the VM has access to.

Unpatched vulnerabilities can expose system weaknesses and create an entry point for attackers to gain unauthorized access to the host. This can lead to data breaches, unauthorized modifications, or control of the underlining system.

Remediation

  1. Review any associated vulnerability references or advisories.
  2. Review the level of access and privileges associated with the VM and scope them down to the minimum required.
  3. Apply the appropriate patch based on remediation guidance. If no patch is available, apply compensating controls such as disabling or removal of the vulnerable component.
  4. Assess whether this instance needs to be accessible from the internet. If not, restrict access to the instance.
PREVIEWING: Cyril-Bouchiat/add-vm-package-explorer-doc