Publicly Accessible Azure VM instance has a privileged service account and a critical vulnerability

이 페이지는 아직 한국어로 제공되지 않으며 번역 작업 중입니다. 번역에 관한 질문이나 의견이 있으시면 언제든지 저희에게 연락해 주십시오.

Description

A privileged, publicly accessible Azure VM instance has one or more critical severity vulnerabilities.

A compromise of this VM could lead to potential abuse of the privileges associated with the VM, and could lead to unauthorized access to the account and other resources the VM has access to.

Unpatched vulnerabilities can expose system weaknesses and create an entry point for attackers to gain unauthorized access to the host. This can lead to data breaches, unauthorized modifications, or control of the underlining system.

Remediation

  1. Review any associated vulnerability references or advisories.
  2. Review the level of access and privileges associated with the VM and scope them down to the minimum required.
  3. Apply the appropriate patch based on remediation guidance. If no patch is available, apply compensating controls such as disabling or removal of the vulnerable component.
  4. Assess whether this instance needs to be accessible from the internet. If not, restrict access to the instance.
PREVIEWING: rtrieu/product-analytics-ui-changes