Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23658: CWE-522: Insufficiently Protected Credentials in Microsoft Azure DevOps: msazure

0
High
VulnerabilityCVE-2026-23658cvecve-2026-23658cwe-522
Published: Thu Mar 19 2026 (03/19/2026, 21:06:23 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Azure DevOps: msazure

Description

Insufficiently protected credentials in Azure DevOps allows an unauthorized attacker to elevate privileges over a network.

AI-Powered Analysis

AILast updated: 03/19/2026, 21:40:02 UTC

Technical Analysis

CVE-2026-23658 is a vulnerability classified under CWE-522 (Insufficiently Protected Credentials) affecting Microsoft Azure DevOps, specifically the msazure component. The vulnerability arises from inadequate protection of credentials within the Azure DevOps environment, which can be exploited by an attacker over a network to elevate privileges without requiring prior authentication or user interaction. The CVSS v3.1 base score is 8.6, indicating a high-severity issue with a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact is primarily on confidentiality (C:H), with no direct impact on integrity or availability. This suggests that attackers can gain unauthorized access to sensitive credentials, potentially compromising the security of Azure DevOps projects and pipelines. No patches or known exploits are currently available, but the vulnerability was reserved in January 2026 and published in March 2026. The lack of patches necessitates immediate defensive measures to mitigate risk. Azure DevOps is widely used for continuous integration and continuous deployment (CI/CD), making this vulnerability critical for software development lifecycles and supply chain security.

Potential Impact

The vulnerability allows attackers to remotely elevate privileges by exploiting insufficiently protected credentials, leading to unauthorized access to sensitive information within Azure DevOps environments. This can compromise the confidentiality of source code, build pipelines, and deployment configurations, potentially enabling further attacks such as code tampering, insertion of malicious code, or disruption of software delivery processes. Organizations relying on Azure DevOps for critical development and operational workflows face increased risk of intellectual property theft, supply chain attacks, and operational disruptions. The absence of required authentication and user interaction lowers the barrier for exploitation, increasing the likelihood of attacks once exploit code becomes available. Given Azure DevOps' global adoption, the impact extends to a wide range of industries including technology, finance, healthcare, and government sectors. The vulnerability could also undermine trust in cloud-based development platforms and complicate compliance with data protection regulations.

Mitigation Recommendations

Until official patches are released, organizations should implement network segmentation to limit access to Azure DevOps services, restricting connections to trusted IP addresses and VPNs. Employ strict access controls and multi-factor authentication (MFA) for all Azure DevOps accounts to reduce the risk of credential compromise. Monitor logs and network traffic for unusual access patterns or privilege escalations indicative of exploitation attempts. Regularly audit credential storage and usage within Azure DevOps to ensure secrets are encrypted and managed securely, leveraging Azure Key Vault or similar services. Disable or limit legacy protocols and services that may expose credentials in plaintext. Educate development and operations teams about the vulnerability and encourage prompt reporting of suspicious activity. Prepare incident response plans specific to Azure DevOps compromise scenarios. Once patches are available, prioritize their deployment in all affected environments. Consider using Azure Security Center and other cloud-native security tools to enhance detection and response capabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2026-01-14T16:59:33.463Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bc698ce32a4fbe5ffadffe

Added to database: 3/19/2026, 9:24:28 PM

Last enriched: 3/19/2026, 9:40:02 PM

Last updated: 3/20/2026, 4:04:32 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses