CVE-2026-23651: Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability

Overview

Severity
Medium (CVSS 6.7)
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
Category
Elevation of Privilege
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2026-Mar
Released
2026-03-05
Last Updated
2026-03-06
EPSS Score
0.07% (percentile: 21.9%)

Description

Permissive regular expression in Azure Compute Gallery allows an authorized attacker to elevate privileges locally.

FAQ

Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability? This vulnerability has been mitigated by Microsoft in the Azure Confidential ACI service. No service update, patch, reboot, or upgrade is required. In Azure Confidential ACI scenarios, customers are responsible for enforcing existing Confidential Compute security policies. Customers should verify that their policies enforce the documented minimum Security Version Number (SVN) for the Utility VM (UVM), as described in the Confidential ACI configuration guidance. If a customer determines that their policy configuration does not align with the published minimum SVN guidance, correcting the configuration is part of normal policy enforcement and not a remediation action introduced by this CVE. No additional customer action is required beyond adherence to existing guidance. Please refer to the following for more information: https://github.com/microsoft/confidential-aci-examples/blob/main/docs/Confidential_ACI_SCHEME.md

Affected Products (1)

Azure

  • Microsoft ACI Confidential Containers

Acknowledgments

<a href="https://x.com/yuvalavra">Yuval Avrahami</a>

Revision History

  • 2026-03-05: Information published.
  • 2026-03-06: Added FAQ information. This is an informational change only.