Plattform
dotnet
Komponente
azure-stack-hub
Behoben in
1.2406.1.23
1.2408.1.50
1.2501.1.47
CVE-2025-53793 describes an Information Disclosure vulnerability within Microsoft Azure Stack Hub. This flaw allows an unauthorized attacker to expose sensitive information across a network connection. The vulnerability impacts versions 1.0.0 through 1.2501.1.47, and a fix is available in version 1.2501.1.47.
Successful exploitation of CVE-2025-53793 could lead to the exposure of confidential data stored or processed within the Azure Stack Hub environment. An attacker who gains unauthorized access could potentially retrieve sensitive information such as user credentials, configuration details, or even application data. The scope of the data exposed would depend on the attacker's access level and the specific information accessible within the compromised system. While the description doesn't specify a direct path to lateral movement, the disclosure of credentials could facilitate such actions within the Azure Stack Hub infrastructure or connected networks. The blast radius extends to any systems or services that rely on the confidentiality of data handled by Azure Stack Hub.
CVE-2025-53793 was published on 2025-08-12. There is no indication of active exploitation or a KEV listing at the time of writing. Public proof-of-concept code is currently unavailable. The vulnerability's impact hinges on the attacker's ability to bypass authentication mechanisms within Azure Stack Hub.
Organizations deploying Azure Stack Hub, particularly those utilizing older versions (1.0.0–1.2501.1.47), are at risk. Environments with relaxed authentication policies or inadequate network segmentation are especially vulnerable. Shared hosting environments leveraging Azure Stack Hub may also be impacted if proper isolation measures are not in place.
• .NET: Monitor Azure Stack Hub logs for unusual authentication attempts or access patterns. Use Azure Monitor to create alerts for suspicious activity. • .NET: Use Sysinternals tools like Process Monitor to observe network connections and file access attempts by Azure Stack Hub processes. • .NET: Review Azure Stack Hub security logs for failed login attempts and unauthorized access events. • .NET: Examine Azure Stack Hub configuration files for any signs of tampering or unauthorized modifications.
disclosure
Exploit-Status
EPSS
0.15% (35% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2025-53793 is to upgrade Azure Stack Hub to version 1.2501.1.47 or later. Prior to upgrading, it's crucial to review Microsoft's official documentation for compatibility and potential breaking changes. Consider performing a test upgrade in a non-production environment first to validate the upgrade process and application functionality. While no specific WAF or proxy rules are mentioned, implementing network segmentation and strict access controls can help limit the potential impact of a successful attack. Regularly review Azure Stack Hub's security configuration and ensure adherence to security best practices.
Actualice Azure Stack Hub a la última versión disponible. Esto solucionará la vulnerabilidad de divulgación de información causada por una autenticación incorrecta. Consulte el portal de Azure Stack Hub para obtener instrucciones sobre cómo aplicar las actualizaciones.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2025-53793 is a HIGH severity vulnerability allowing unauthorized network information disclosure in Azure Stack Hub versions 1.0.0–1.2501.1.47. An attacker can potentially expose sensitive data.
If you are running Azure Stack Hub versions 1.0.0 through 1.2501.1.47, you are potentially affected by this Information Disclosure vulnerability.
Upgrade Azure Stack Hub to version 1.2501.1.47 or later to remediate the vulnerability. Review Microsoft's official documentation before upgrading.
There is currently no public information indicating active exploitation of CVE-2025-53793.
Refer to the official Microsoft Security Update Guide for details on CVE-2025-53793 and related security advisories.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine packages.lock.json-Datei hoch und wir sagen dir sofort, ob du betroffen bist.