CVE-2026-21531: Azure SDK for Python Remote Code Execution Vulnerability

Overview

Severity
Critical (CVSS 9.8)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Category
Remote Code Execution
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2026-Feb
Released
2026-02-10
EPSS Score
0.46% (percentile: 64.1%)

Description

Deserialization of untrusted data in Azure SDK allows an unauthorized attacker to execute code over a network.

FAQ

How could an attacker exploit this vulnerability? An attacker could supply a maliciously crafted continuation token that, when processed by the Azure AI Language Conversations Authoring SDK, triggers unsafe deserialization and executes attacker‑controlled code on the system using the SDK.

Detection & Weaponization (1 sources)

Maturity: Exploit

  • GitHub PoC: 1 repositories

Affected Products (1)

Azure

  • Azure AI Language Authoring

Security Updates (1)

Acknowledgments

<a href="https://www.linkedin.com/in/muhammad-fadilullah-dzaki-a9080a2b5/">Muhammad Fadilullah Dzaki</a>

Revision History

  • 2026-02-10: Information published.