CVE-2026-26124: Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability

Overview

Severity
Medium (CVSS 6.7)
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
Category
Elevation of Privilege
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2026-Mar
Released
2026-03-05
Last Updated
2026-03-06
EPSS Score
0.11% (percentile: 29.2%)

Description

'.../...//' in Azure Compute Gallery allows an authorized attacker to elevate privileges locally.

FAQ

Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability? This vulnerability has been mitigated by Microsoft in the Azure Confidential ACI service. No service update, patch, reboot, or upgrade is required. For Azure Confidential ACI workloads, customers are expected to enforce existing Confidential Compute policies. Customers should verify that their Confidential Compute Environment (CCE) policy enforces the documented minimum Security Version Number (SVN) for infrastructure sidecar components, as described in the Confidential ACI configuration guidance. If a customer finds that their policy configuration does not align with the published minimum SVN guidance, updating the configuration is considered standard policy enforcement and not a vulnerability‑specific remediation. No additional customer action is required beyond following existing guidance. Please refer to the follwoing for more information: https://github.com/microsoft/confidential-aci-examples/blob/main/docs/Confidential_ACI_SCHEME.md Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability? This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency. Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information.

Affected Products (1)

Azure

  • Microsoft ACI Confidential Containers

Acknowledgments

<a href="https://x.com/yuvalavra">Yuval Avrahami</a>

Revision History

  • 2026-03-05: Information published.
  • 2026-03-06: Added FAQ information. This is an informational change only.