Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33107: CWE-918: Server-Side Request Forgery (SSRF) in Microsoft Azure Databricks

0
Critical
VulnerabilityCVE-2026-33107cvecve-2026-33107cwe-918
Published: Thu Apr 02 2026 (04/02/2026, 23:26:57 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Azure Databricks

Description

CVE-2026-33107 is a critical Server-Side Request Forgery (SSRF) vulnerability in Microsoft Azure Databricks that allows an unauthorized attacker to make arbitrary requests from the server, potentially leading to full compromise of confidentiality, integrity, and availability. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. Due to the SSRF nature, attackers can pivot within internal networks, access sensitive resources, or escalate privileges. Although no known exploits are currently observed in the wild, the CVSS score of 10 reflects the severe impact and ease of exploitation. Organizations using Azure Databricks should prioritize patching once available and implement network-level protections to mitigate exploitation risks. Countries with significant Azure cloud adoption and critical infrastructure relying on Databricks are at highest risk. Immediate mitigation steps include restricting outbound requests from Databricks environments and monitoring for anomalous network activity.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 23:53:22 UTC

Technical Analysis

CVE-2026-33107 is a critical Server-Side Request Forgery (SSRF) vulnerability identified in Microsoft Azure Databricks, a cloud-based data analytics platform widely used for big data processing and machine learning workloads. SSRF vulnerabilities occur when an attacker can manipulate a server to send crafted requests to internal or external systems that the attacker cannot directly access. In this case, the vulnerability allows an unauthenticated attacker to induce Azure Databricks servers to make arbitrary network requests, potentially accessing internal services, metadata endpoints, or other sensitive resources within the cloud environment. The vulnerability is classified under CWE-918, indicating improper restriction of outgoing requests. The CVSS v3.1 base score is 10.0, reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). The scope is changed (S:C), meaning the vulnerability affects components beyond the initially vulnerable component. Although no public exploits have been reported yet, the critical severity and ease of exploitation make this a significant threat. Azure Databricks environments are often integrated with other Azure services and enterprise data stores, increasing the potential attack surface and impact. The lack of available patches at the time of publication necessitates immediate defensive measures to reduce risk.

Potential Impact

The impact of CVE-2026-33107 is severe for organizations globally that utilize Azure Databricks for data analytics and processing. Exploitation can lead to unauthorized access to internal cloud resources, including sensitive data stores, internal APIs, and metadata services that may contain credentials or configuration details. Attackers can leverage SSRF to perform lateral movement within the cloud environment, escalate privileges, and potentially execute arbitrary code or disrupt services. The compromise of confidentiality, integrity, and availability can result in data breaches, operational downtime, and loss of trust. Enterprises relying on Azure Databricks for critical analytics workloads, especially in regulated industries such as finance, healthcare, and government, face heightened risks of compliance violations and financial losses. The cloud-native nature of the platform means that a successful attack could also impact multi-tenant environments, increasing the scope of damage.

Mitigation Recommendations

Until an official patch is released by Microsoft, organizations should implement several specific mitigations to reduce the risk of exploitation: 1) Restrict outbound network traffic from Azure Databricks clusters using network security groups (NSGs) or Azure Firewall to limit access to only trusted endpoints and block access to internal metadata services or sensitive internal IP ranges. 2) Enable and closely monitor logging and alerting for unusual outbound requests originating from Databricks environments, focusing on requests to internal IPs or unexpected external domains. 3) Employ Azure Private Link or service endpoints to isolate Databricks traffic and reduce exposure to public networks. 4) Review and tighten role-based access control (RBAC) policies to minimize the number of users and services that can create or modify Databricks clusters. 5) Use Azure Defender for Cloud to detect suspicious activities related to SSRF attempts. 6) Educate DevOps and security teams about the SSRF risk and ensure rapid response plans are in place. Once Microsoft releases a patch, prioritize immediate deployment across all affected environments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2026-03-17T20:15:23.720Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cefde9e6bfc5ba1d075515

Added to database: 4/2/2026, 11:38:17 PM

Last enriched: 4/2/2026, 11:53:22 PM

Last updated: 4/3/2026, 2:07:25 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses