Security & Infrastructure Tools
Microsoft rejects critical Azure vulnerability report, no CVE issued
Security researcher Justin O'Leary alleges a critical privilege-escalation flaw in Azure Backup for AKS that could let a user with only the Backup Contributor role gain cluster-admin rights via the Trusted Access mechanism. Microsoft says the behavior was expected and that no product changes or CVE were issued, despite O'Leary's claims and evidence of new permission checks and failed exploits after disclosure. CERT/CC independently validated the issue, assigned a tracking ID, and initially scheduled public CVE disclosure, but Microsoft lobbied MITRE to block a CVE and CERT/CC closed the case under CNA rules. After the disclosure, the attacker path reportedly no longer works; Microsoft now requires manual Trusted Access configuration and added permission checks, suggesting the vulnerability was fixed without a public advisory. The episode underscores the 'validation gap' and the challenge defenders face when CVEs or public advisories are absent.

MICROSOFT REJECTS CRITICAL AZURE VULNERABILITY REPORT, NO CVE ISSUED
Overview
- A security researcher alleged that Microsoft quietly patched a critical privilege-escalation flaw in Azure Backup for AKS, effectively blocking a CVE issuance.
- Microsoft disputes the claim, saying no product changes were made and that the observed behavior was expected.
- The matter moved through CERT/CC, which independently validated the vulnerability and assigned an identifier, only for the process to stall as Microsoft pressed against CVE assignment.
- The latest observations suggest the original attack path no longer works, yet Microsoft has not issued a public advisory.
Timeline of key events
- March (this March): The vulnerability was discovered by a researcher and reported to Microsoft on March 17.
- April 13: Microsoft Security Response Center (MSRC) rejected the report, characterizing the issue as involving pre-existing administrator access on a cluster.
- April 16: CERT Coordination Center (CERT/CC) independently validated the vulnerability and assigned it an identifier, VU#284781, with a disclosure date that was initially planned for June 1, 2026.
- May 4: Microsoft staff reportedly contacted MITRE recommending against CVE assignment, arguing that the issue requires pre-existing administrative access.
- CERT/CC subsequently closed the case under CNA (CVE Numbering Authority) rules, effectively giving Microsoft final authority over CVE issuance for its own products.
- Observations post-disclosure: The original attack path apparently ceased to work, with new errors appearing in the system and additional permission checks being introduced.
Attack mechanics and the vulnerability as described
- Azure Backup for AKS uses a Trusted Access mechanism to grant backup extensions cluster-admin privileges inside Kubernetes clusters.
- Reported flaw: a user with only the Backup Contributor role on a backup vault could trigger the Trusted Access relationship without any Kubernetes permissions.
- Attack sequence imagined:
- An attacker enables backup on a target AKS cluster.
- Azure automatically configures Trusted Access with cluster-admin privileges.
- The attacker could then exfiltrate secrets via backup operations or restore malicious workloads into the cluster.
- Classification: The issue was described as a Confused Deputy vulnerability (CWE-441), arising from the interaction of Azure RBAC and Kubernetes RBAC trust boundaries.
Microsoft’s position and the evolving evidence
- Official stance: Microsoft indicated the behavior was expected and required pre-existing administrative privileges within the customer environment; no product changes were made and no CVE or CVSS score were issued.
- Post-disclosure observations cited by the researcher:
- The attack path that once existed no longer functions.
- New error messages appeared, such as “ERROR: UserErrorTrustedAccessGatewayReturnedForbidden,” indicating changes to the Trusted Access flow.
- Azure Backup for AKS reportedly requires Trusted Access to be configured manually before enabling backups, reversing the prior automatic configuration behavior.
- Additional permission checks emerged: the vault MSI now requires Reader permissions on both the AKS cluster and the snapshot resource group, while the AKS cluster MSI requires Contributor permissions on the snapshot resource group.
- Implication: The vulnerability may have been mitigated or neutralized in practice, but Microsoft has not issued a public advisory or notified customers through CVE channels.
The visibility problem for defenders and the CVE gap
- Without an issued CVE or formal advisory, defenders face a narrow window of visibility into exposure and remediation timelines.
- Researcher’s assessment: organizations that granted Backup Contributor roles during an unknown window up to May 2026 were potentially exposed to privilege escalation.
- The lack of a CVE complicates tracking and remediation, and silent patching can obscure who remains at risk.
- Broader context: disputes between researchers and large vendors over severity, exploitability, and disclosure have intensified as vulnerability programs scale and as AI-assisted reports proliferate.
The validation gap: what automated pentesting answers—and doesn’t
- Automated pentesting tools excel at mapping “can an attacker move laterally?” but often fail to validate deeper controls:
- Do your controls block threats effectively?
- Do detection rules fire as expected?
- Do your cloud configurations hold under real-world threat models?
- A guide associated with the discussion emphasizes validating across six key surfaces beyond mere path discovery, highlighting the need for a comprehensive approach to security validation, not just automated discoveries.
Implications for risk management and future disclosures
- The case highlights a structural tension between researchers, vendors, and disclosure processes.
- Silent patches and the absence of public advisories can leave customers in the dark about exposure timelines and remediation steps.
- When a vulnerability affects privilege boundaries in cloud environments, the balance between expedient remediation and transparent communication becomes critical for maintaining trust and ensuring consistent protection across customer deployments.
Conclusion: a landscape of contested findings and evolving safeguards
- The Azure Backup for AKS scenario illustrates how complex cross-boundary trust interactions can create powerful attack surfaces.
- Even when a practical fix appears to reduce risk, the lack of public notification and formal CVE issuance can hinder defense-in-depth efforts.
- The episode underscores the ongoing need for transparent, timely vulnerability handling, clear criteria for CVE assignment in cloud services, and a framework that aligns incentives for researchers, vendors, and customers to improve security without compromising operational resilience.


