CVE-2026-33844: Azure Managed Instance for Apache Cassandra Remote Code Execution Vulnerability

Overview

Severity
Critical (CVSS 9)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
Category
Remote Code Execution
Exploit Status
Not Exploited
Patch Tuesday
2026-May
Released
2026-05-07
EPSS Score
0.05% (percentile: 15.3%)

Description

Improper input validation in Azure Managed Instance for Apache Cassandra allows an authorized attacker to execute code over a network.

FAQ

Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability? This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency. Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information.

Affected Products (1)

Azure

  • Azure Managed Instance for Apache Cassandra

Acknowledgments

<a href="https://twitter.com/wtm_offensi">wtm</a> with <a href="https://offensi.com/">Offensi</a>

Revision History

  • 2026-05-07: Information published.