Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59292: CWE-73: External Control of File Name or Path in Microsoft Azure Compute Gallery

0
High
VulnerabilityCVE-2025-59292cvecve-2025-59292cwe-73
Published: Tue Oct 14 2025 (10/14/2025, 17:00:50 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Azure Compute Gallery

Description

External control of file name or path in Confidential Azure Container Instances allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

AILast updated: 01/02/2026, 23:01:32 UTC

Technical Analysis

CVE-2025-59292 is a vulnerability classified under CWE-73 (External Control of File Name or Path) affecting Microsoft Azure Compute Gallery, specifically within Confidential Azure Container Instances. This vulnerability allows an attacker who already has authorized access with high privileges to manipulate file names or paths externally, leading to local privilege escalation. The flaw arises because the system does not adequately validate or restrict file path inputs, enabling attackers to influence file system operations in a way that escalates their privileges beyond intended limits. The vulnerability has a CVSS 3.1 base score of 8.2, indicating high severity, with impacts on confidentiality, integrity, and availability. The attack vector is local (AV:L), requiring the attacker to have high privileges (PR:H) but no user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially compromised component. Although no exploits are currently known in the wild, the potential for privilege escalation in cloud environments is significant, especially in confidential computing scenarios where sensitive data and workloads are protected. This vulnerability could allow attackers to gain unauthorized access to sensitive data, modify or delete critical files, or disrupt services running within Azure Compute Gallery. The lack of patch links suggests that a fix may still be pending or in development, emphasizing the need for vigilance and interim mitigations.

Potential Impact

For European organizations, the impact of CVE-2025-59292 is substantial due to the widespread adoption of Microsoft Azure cloud services across the continent. Confidential Azure Container Instances are often used to run sensitive workloads that require strong isolation and security guarantees. Exploitation of this vulnerability could lead to unauthorized privilege escalation, enabling attackers to access or manipulate confidential data, disrupt business-critical applications, or pivot to other parts of the network. This could result in data breaches, compliance violations (e.g., GDPR), financial losses, and reputational damage. Given the high CVSS score and the critical nature of cloud infrastructure, organizations relying on Azure Compute Gallery must consider this vulnerability a serious threat. The local attack vector means that attackers need some level of access, but once achieved, the escalation could facilitate broader compromise. The confidentiality, integrity, and availability of cloud-hosted services are all at risk, potentially affecting multi-tenant environments and shared resources.

Mitigation Recommendations

1. Immediately review and restrict access controls to Confidential Azure Container Instances to limit the number of users with high privileges. 2. Implement strict input validation and sanitization for any file name or path inputs within Azure Compute Gallery configurations or deployment scripts. 3. Monitor logs and system activity for unusual file system operations or privilege escalation attempts within container instances. 4. Apply the official security patches from Microsoft as soon as they become available; subscribe to Microsoft security advisories for updates. 5. Use Azure Security Center and other cloud-native security tools to enforce least privilege principles and detect anomalous behavior. 6. Consider isolating sensitive workloads in separate environments or using additional encryption layers to mitigate potential data exposure. 7. Conduct regular security audits and penetration testing focused on container and cloud infrastructure to identify similar weaknesses. 8. Educate administrators and developers on secure coding and configuration practices related to file path handling in cloud environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-09-11T19:36:03.690Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee85903dd1bfb0b7e4239c

Added to database: 10/14/2025, 5:17:04 PM

Last enriched: 1/2/2026, 11:01:32 PM

Last updated: 1/18/2026, 7:31:30 AM

Views: 84

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats