Microsoft Azure Shared Key Misconfiguration Could Lead to RCE
Azure admins are urged to disable shared key access and implement Azure Active Directory authentication.
April 11, 2023
Abuse of shared key authorizations, a default on Azure storage accounts, could allow a threat actor to steal higher privileged access tokens, move laterally throughout the network, and execute remote code, aka RCE.
Researchers at Orca were able to demonstrate how an attacker could breach Microsoft Storage Accounts, but Microsoft's Security Response Center (MSRC) chalked it up to a misconfiguration rather than a vulnerability. MRSC did offer guidance to users to appropriately configure Azure Functions and "effectively deploy environments with the least privilege." The company said it is planning to address the issue as part of its regular "experience improvements."
Orca researchers urge IT teams to take the issue seriously, and added that even though Microsoft doesn't consider the potential privilege escalation a vulnerability, "This does not mean that it is less dangerous," Orca's report said. "Actually, it should be considered even more dangerous since there is no straightforward 'fix'."
Administrators are advised by Microsoft to:
Review user permissions to ensure least-privilege access
Monitor logs for account key access
Consider using a storage account dedicated to application code blob storage
Enable Microsoft Defender for Cloud (MDC) on storage accounts
About the Author(s)
You May Also Like
Why Effective Asset Management is Critical to Enterprise Cybersecurity
May 21, 2024Finding Your Way on the Path to Zero Trust
May 22, 2024Extending Access Management: Securing Access for all Identities, Devices, and Applications
June 4, 2024Assessing Software Supply Chain Risk
June 6, 2024Preventing Attackers From Wandering Through Your Enterprise Infrastructure
June 19, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024