Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59291: CWE-73: External Control of File Name or Path in Microsoft Azure Compute Gallery

0
High
VulnerabilityCVE-2025-59291cvecve-2025-59291cwe-73
Published: Tue Oct 14 2025 (10/14/2025, 17:00:50 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Azure Compute Gallery

Description

External control of file name or path in Confidential Azure Container Instances allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

AILast updated: 11/27/2025, 03:34:25 UTC

Technical Analysis

CVE-2025-59291 is a vulnerability identified in Microsoft Azure Compute Gallery, specifically affecting Confidential Azure Container Instances. It is categorized under CWE-73, which involves external control of file name or path. The flaw allows an attacker who already has authorized access with high privileges to manipulate file names or paths used by the system, leading to local privilege escalation. This means the attacker can gain elevated rights on the host system beyond their initial permissions, potentially compromising the confidentiality, integrity, and availability of the containerized workloads and the underlying infrastructure. The vulnerability has a CVSS v3.1 base score of 8.2, reflecting high severity due to its impact on all three security properties (C, I, A), the requirement for low attack complexity, and the need for high privileges but no user interaction. Although no known public exploits exist at the time of publication, the vulnerability's presence in a widely used cloud service makes it a significant concern. The lack of specified affected versions suggests the issue may be present across multiple or all current deployments of Azure Compute Gallery's confidential container instances. The vulnerability is particularly critical in environments where sensitive workloads run in confidential containers, as attackers could leverage this flaw to escape container isolation or manipulate critical system components. Microsoft has published the vulnerability but has not yet released patches, emphasizing the need for vigilance and interim mitigations.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially for those relying on Azure Compute Gallery for confidential container workloads. Successful exploitation could lead to unauthorized access to sensitive data, disruption of critical services, and potential lateral movement within cloud environments. The confidentiality of data processed in confidential containers could be compromised, undermining compliance with GDPR and other data protection regulations. Integrity of workloads and system configurations could be altered, leading to persistent threats or data corruption. Availability could also be affected if attackers disrupt container operations or escalate privileges to disable security controls. Given the increasing adoption of cloud services across Europe, particularly in sectors like finance, healthcare, and government, the impact could be widespread. Organizations with complex hybrid cloud environments may face additional challenges in detecting and mitigating such local privilege escalations. The vulnerability also raises concerns about the trustworthiness of confidential computing environments, which are designed to provide enhanced security guarantees.

Mitigation Recommendations

Until official patches are released by Microsoft, European organizations should implement several specific mitigations. First, enforce strict access controls and limit the number of users with high privileges on Azure Compute Gallery and confidential container instances. Employ the principle of least privilege rigorously to reduce the attack surface. Monitor logs and system behavior for unusual file path manipulations or privilege escalations within container instances. Use Azure Security Center and other cloud-native monitoring tools to detect anomalous activities. Validate and sanitize all file path inputs in custom scripts or automation interacting with Azure Compute Gallery resources. Consider isolating confidential container workloads in separate environments with additional monitoring and alerting. Prepare for rapid deployment of patches once available by maintaining an up-to-date inventory of affected assets. Engage with Microsoft support channels for guidance and updates. Additionally, review and update incident response plans to address potential exploitation scenarios involving local privilege escalation in cloud containers.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-09-11T19:36:03.690Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee85903dd1bfb0b7e42399

Added to database: 10/14/2025, 5:17:04 PM

Last enriched: 11/27/2025, 3:34:25 AM

Last updated: 12/1/2025, 10:57:46 AM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats