Skip to main content

CVE-2025-33072: CWE-284: Improper Access Control in Microsoft Microsoft msagsfeedback.azurewebsites.net

High
VulnerabilityCVE-2025-33072cvecve-2025-33072cwe-284
Published: Thu May 08 2025 (05/08/2025, 22:17:22 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Microsoft msagsfeedback.azurewebsites.net

Description

Improper access control in Azure allows an unauthorized attacker to disclose information over a network.

AI-Powered Analysis

AILast updated: 07/18/2025, 21:12:27 UTC

Technical Analysis

CVE-2025-33072 is a high-severity vulnerability classified under CWE-284 (Improper Access Control) affecting the Microsoft product msagsfeedback.azurewebsites.net, a component hosted on Azure. The vulnerability allows an unauthorized attacker to disclose sensitive information over a network without requiring privileges (PR:N) but does require user interaction (UI:R). The attack vector is network-based (AV:N), meaning the attacker can exploit this remotely. The vulnerability impacts confidentiality and integrity significantly (C:H/I:H), but does not affect availability (A:N). The scope is unchanged (S:U), indicating the vulnerability affects only the vulnerable component and does not propagate to other components or systems. The CVSS 3.1 base score is 8.1, reflecting a high severity level. The vulnerability arises from improper access control mechanisms, which fail to restrict unauthorized access to sensitive data or functionality, potentially allowing attackers to disclose confidential information. No patches or known exploits in the wild have been reported yet. Given that msagsfeedback.azurewebsites.net is an Azure-hosted Microsoft service, this vulnerability could impact organizations relying on this service for feedback or telemetry data, exposing sensitive internal or user information if exploited. The requirement for user interaction suggests that exploitation might involve phishing or social engineering to trigger the vulnerability. The lack of required privileges lowers the barrier for attackers, increasing risk. The vulnerability was reserved in mid-April 2025 and published in early May 2025, indicating recent discovery and disclosure.

Potential Impact

For European organizations, this vulnerability poses a significant risk to confidentiality and integrity of sensitive data handled via the affected Microsoft Azure service. Organizations using Microsoft cloud services, particularly those integrating msagsfeedback.azurewebsites.net for feedback or telemetry, could face unauthorized data disclosure, potentially exposing personal data, intellectual property, or internal operational details. This could lead to regulatory non-compliance under GDPR due to data breaches, resulting in legal penalties and reputational damage. The requirement for user interaction means phishing campaigns targeting European employees could be a vector, increasing the risk of successful exploitation. The high integrity impact also suggests attackers might manipulate feedback or telemetry data, potentially affecting decision-making or automated processes. While availability is not impacted, the breach of confidentiality and integrity can disrupt trust in cloud services and lead to operational and strategic consequences. Given the widespread adoption of Microsoft Azure in Europe, the potential impact is broad, affecting sectors such as finance, healthcare, government, and critical infrastructure that rely heavily on cloud services and have stringent data protection requirements.

Mitigation Recommendations

European organizations should immediately review their use of msagsfeedback.azurewebsites.net and related Azure services to identify exposure. Specific mitigations include: 1) Implement strict network segmentation and access controls to limit exposure of the vulnerable service to only trusted users and systems. 2) Enhance user awareness training focused on phishing and social engineering to reduce the risk of user interaction exploitation. 3) Monitor network traffic and logs for unusual access patterns or data exfiltration attempts related to msagsfeedback.azurewebsites.net. 4) Employ Azure-native security features such as Conditional Access Policies and Azure AD Privileged Identity Management to enforce least privilege and multi-factor authentication. 5) Coordinate with Microsoft support and monitor official channels for patches or updates addressing CVE-2025-33072 and apply them promptly once available. 6) Conduct penetration testing and vulnerability assessments focused on access control mechanisms in Azure services to proactively identify and remediate similar issues. 7) Review and update incident response plans to include scenarios involving cloud service data disclosure. These targeted actions go beyond generic advice by focusing on the specific service and attack vectors involved.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-04-15T17:46:28.203Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aeba23

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/18/2025, 9:12:27 PM

Last updated: 8/21/2025, 6:20:55 AM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats