CVE-2022-30187: Azure Storage Library Information Disclosure Vulnerability

Overview

Severity
Medium (CVSS 4.7)
CVSS Vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
Category
Information Disclosure
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2022-Jul
Released
2022-07-12
EPSS Score
0.34% (percentile: 56.5%)

FAQ

What is CBC padding in storage SDK? Azure Storage .NET, Java, and Python SDKs use cipher block chaining (CBC mode) for client-side encryption. This client-side encryption is used by very small set of customers, who encrypt their data on the client with a customer-managed key that is maintained in Azure Key Vault or another key store before uploading to Azure Storage. What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could decrypt data on the client side and disclose the content of the file or blob. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.

Affected Products (5)

Azure

  • Azure Storage Blobs client library for .NET
  • Azure Storage Queues client library for .NET
  • Azure Storage Blobs client library for Java
  • Azure Storage Queues client library for Python

Microsoft Dynamics

  • Azure Storage Blobs client library for Python

Security Updates (5)

Acknowledgments

<a href="https://twitter.com/schmiegsophie">Sophie Schmieg</a> with <a href="https://google.com/">Google</a>

Revision History

  • 2022-07-12: Information published.