Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59292: CWE-73: External Control of File Name or Path in Microsoft Azure Compute Gallery

0
High
VulnerabilityCVE-2025-59292cvecve-2025-59292cwe-73
Published: Tue Oct 14 2025 (10/14/2025, 17:00:50 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Azure Compute Gallery

Description

External control of file name or path in Confidential Azure Container Instances allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 14:03:37 UTC

Technical Analysis

CVE-2025-59292 is a vulnerability classified under CWE-73 (External Control of File Name or Path) affecting Microsoft Azure Compute Gallery, specifically Confidential Azure Container Instances. This flaw allows an attacker who already has authorized access with high privileges to manipulate file names or paths externally, leading to local privilege escalation. The vulnerability arises from insufficient validation or sanitization of file path inputs, enabling attackers to influence file system operations in a way that escalates their privileges on the host system. The CVSS v3.1 base score is 8.2, reflecting high impact on confidentiality, integrity, and availability, with an attack vector limited to local access but requiring low attack complexity and no user interaction. The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially compromised component. Although no public exploits are reported yet, the vulnerability poses a significant risk to environments running confidential containers in Azure Compute Gallery, which are often used for sensitive or regulated workloads. The lack of available patches at the time of publication necessitates immediate attention to access controls and monitoring. This vulnerability highlights the risks of external control over file paths in cloud container environments and the importance of secure coding and input validation practices in cloud service components.

Potential Impact

The vulnerability allows an attacker with existing high privileges to escalate their privileges locally, potentially gaining full control over the affected container instance and underlying host resources. This can lead to unauthorized access to sensitive data, modification or deletion of critical files, and disruption of services hosted within the Azure Compute Gallery environment. Given the confidentiality focus of the affected container instances, exploitation could result in severe data breaches, intellectual property theft, or compromise of regulated workloads. The integrity and availability of cloud services may also be impacted, causing operational downtime and loss of trust. Organizations relying on Azure Compute Gallery for confidential workloads face increased risk of insider threats or compromised credentials being leveraged for broader system compromise. The high CVSS score reflects the broad impact and ease of exploitation once local access is obtained, emphasizing the need for rapid mitigation to prevent lateral movement and privilege escalation within cloud environments.

Mitigation Recommendations

1. Apply security patches from Microsoft immediately once they become available to address CVE-2025-59292. 2. Restrict and tightly control administrative and privileged access to Azure Compute Gallery and Confidential Azure Container Instances to minimize the risk of an attacker obtaining high-level privileges. 3. Implement robust monitoring and alerting for unusual file system activities, especially those involving file path manipulations or unexpected privilege escalations. 4. Use Azure security features such as Just-In-Time (JIT) VM access and Azure Defender to reduce attack surface and detect suspicious behaviors. 5. Enforce strict input validation and sanitization policies in any custom scripts or automation interacting with file paths in the Azure environment. 6. Conduct regular security audits and penetration testing focused on container security and privilege escalation vectors. 7. Segment workloads and apply the principle of least privilege to limit the scope of potential compromise. 8. Educate administrators and developers about the risks of external control of file paths and secure coding best practices to prevent similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-09-11T19:36:03.690Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee85903dd1bfb0b7e4239c

Added to database: 10/14/2025, 5:17:04 PM

Last enriched: 2/28/2026, 2:03:37 PM

Last updated: 3/23/2026, 3:40:45 AM

Views: 103

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses