Initialization of a resource with an insecure default in Azure Compute Gallery allows an authorized attacker to disclose information over a network.
Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability? This vulnerability has been mitigated by Microsoft in the Azure Confidential ACI service. No service update, patch, reboot, or upgrade is required. This issue does not require customers to take any specific action beyond standard operation of Azure Confidential ACI. Existing Confidential Compute guidance continues to apply, and no additional policy checks or configuration changes are required for this vulnerability. Customers can refer to the Confidential ACI configuration guidance to ensure they are following current platform recommendations. Please refer to the follwoing for more information: https://github.com/microsoft/confidential-aci-examples/blob/main/docs/Confidential_ACI_SCHEME.md Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability? This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency. Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information.
Microsoft Offensive Research & Security Engineering