CVE-2022-35776: Denial of Service in Microsoft Azure Site Recovery VMWare to Azure
Azure Site Recovery Denial of Service Vulnerability
AI Analysis
Technical Summary
CVE-2022-35776 is a Denial of Service (DoS) vulnerability affecting Microsoft Azure Site Recovery, specifically the VMWare to Azure replication component version 9.0. Azure Site Recovery is a disaster recovery service that enables replication of virtual machines from on-premises VMWare environments to Azure cloud infrastructure. This vulnerability is categorized under CWE-400, which relates to uncontrolled resource consumption leading to DoS conditions. The CVSS 3.1 base score is 6.2 (medium severity), with the vector indicating that the attack requires adjacent network access (AV:A), low attack complexity (AC:L), and high privileges (PR:H), but no user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact is limited to availability (A:H), with no confidentiality or integrity impact. The exploitability is partially functional (E:P), and the report confidence is confirmed (RC:C). No known exploits are reported in the wild, and no patches have been linked yet. The vulnerability could allow an attacker with high privileges and access to the adjacent network to trigger excessive resource consumption in the Azure Site Recovery service, causing service disruption or denial of replication operations from VMWare to Azure. This could impact disaster recovery capabilities and business continuity for organizations relying on this service for critical workload replication and failover.
Potential Impact
For European organizations, this vulnerability could disrupt disaster recovery processes that rely on Azure Site Recovery for replicating VMWare workloads to Azure. Such disruption could lead to unavailability of failover capabilities during critical incidents, increasing downtime and potential data loss risks. Organizations in sectors with stringent uptime and data protection requirements, such as finance, healthcare, and critical infrastructure, could face operational and compliance challenges. The DoS condition does not compromise data confidentiality or integrity but affects availability, which is crucial for business continuity. Given the requirement for high privileges and adjacent network access, the threat is more relevant to internal or trusted network environments rather than external attackers. However, insider threats or compromised privileged accounts could exploit this vulnerability to degrade recovery services. The absence of known exploits reduces immediate risk, but the medium severity score and potential impact on availability warrant proactive mitigation.
Mitigation Recommendations
European organizations should prioritize the following mitigations: 1) Apply any available patches or updates from Microsoft as soon as they are released to address CVE-2022-35776. 2) Restrict and monitor privileged access to Azure Site Recovery components, ensuring that only authorized personnel have high-level permissions. 3) Segment the network to limit adjacent network access to the Azure Site Recovery service, reducing the attack surface. 4) Implement robust monitoring and alerting for unusual resource consumption or service disruptions in Azure Site Recovery to detect potential exploitation attempts early. 5) Conduct regular audits of disaster recovery configurations and test failover procedures to ensure resilience despite potential service interruptions. 6) Employ network-level controls such as firewalls and intrusion detection systems to detect and block anomalous traffic patterns targeting the recovery service. 7) Maintain an incident response plan that includes scenarios involving disruption of disaster recovery services to minimize downtime and operational impact.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Ireland, Italy
CVE-2022-35776: Denial of Service in Microsoft Azure Site Recovery VMWare to Azure
Description
Azure Site Recovery Denial of Service Vulnerability
AI-Powered Analysis
Technical Analysis
CVE-2022-35776 is a Denial of Service (DoS) vulnerability affecting Microsoft Azure Site Recovery, specifically the VMWare to Azure replication component version 9.0. Azure Site Recovery is a disaster recovery service that enables replication of virtual machines from on-premises VMWare environments to Azure cloud infrastructure. This vulnerability is categorized under CWE-400, which relates to uncontrolled resource consumption leading to DoS conditions. The CVSS 3.1 base score is 6.2 (medium severity), with the vector indicating that the attack requires adjacent network access (AV:A), low attack complexity (AC:L), and high privileges (PR:H), but no user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact is limited to availability (A:H), with no confidentiality or integrity impact. The exploitability is partially functional (E:P), and the report confidence is confirmed (RC:C). No known exploits are reported in the wild, and no patches have been linked yet. The vulnerability could allow an attacker with high privileges and access to the adjacent network to trigger excessive resource consumption in the Azure Site Recovery service, causing service disruption or denial of replication operations from VMWare to Azure. This could impact disaster recovery capabilities and business continuity for organizations relying on this service for critical workload replication and failover.
Potential Impact
For European organizations, this vulnerability could disrupt disaster recovery processes that rely on Azure Site Recovery for replicating VMWare workloads to Azure. Such disruption could lead to unavailability of failover capabilities during critical incidents, increasing downtime and potential data loss risks. Organizations in sectors with stringent uptime and data protection requirements, such as finance, healthcare, and critical infrastructure, could face operational and compliance challenges. The DoS condition does not compromise data confidentiality or integrity but affects availability, which is crucial for business continuity. Given the requirement for high privileges and adjacent network access, the threat is more relevant to internal or trusted network environments rather than external attackers. However, insider threats or compromised privileged accounts could exploit this vulnerability to degrade recovery services. The absence of known exploits reduces immediate risk, but the medium severity score and potential impact on availability warrant proactive mitigation.
Mitigation Recommendations
European organizations should prioritize the following mitigations: 1) Apply any available patches or updates from Microsoft as soon as they are released to address CVE-2022-35776. 2) Restrict and monitor privileged access to Azure Site Recovery components, ensuring that only authorized personnel have high-level permissions. 3) Segment the network to limit adjacent network access to the Azure Site Recovery service, reducing the attack surface. 4) Implement robust monitoring and alerting for unusual resource consumption or service disruptions in Azure Site Recovery to detect potential exploitation attempts early. 5) Conduct regular audits of disaster recovery configurations and test failover procedures to ensure resilience despite potential service interruptions. 6) Employ network-level controls such as firewalls and intrusion detection systems to detect and block anomalous traffic patterns targeting the recovery service. 7) Maintain an incident response plan that includes scenarios involving disruption of disaster recovery services to minimize downtime and operational impact.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2022-07-13T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6838aece182aa0cae28a0d18
Added to database: 5/29/2025, 7:00:30 PM
Last enriched: 7/7/2025, 10:40:23 PM
Last updated: 2/7/2026, 12:29:24 PM
Views: 33
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.