Four zero-day vulnerabilities in an open source piece of software that’s embedded in many popular Azure services can be exploited for privilege escalation and remote code execution attacks, report cybersecurity researchers.
The vulnerabilities in the software agent named Open Management Infrastructure (OMI) were discovered by researchers at Wiz, who estimate that they affect thousands of Azure customers, across millions of endpoints.
We’re looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won’t take more than 60 seconds of your time, and we’d hugely appreciate if you’d share your experiences with us.
“One of the biggest challenges in preventing [cyberattacks] is that our digital supply chain is not transparent. If you don’t know what’s hidden in the services and products you use every day, how can you manage the risk?” argue the researchers.
Software supply chain blind spot
The vulnerabilities affect Azure customers on Linux machines, which, according to some estimates, make up a sizable number of all Azure instances.
These users put their VMs at risk when they use certain Azure services such as Azure Automation, Azure Automatic Update, Azure Log Analytics, Azure Configuration Management, and others.
In fact, Wiz researchers note that analyzing a small sample of Azure tenants revealed that over 65% were at risk of the vulnerabilities, colourfully named “OMIGOD” which was the researchers first reaction when they discovered them.
“In addition to Azure cloud customers, other Microsoft customers are affected since OMI can be independently installed on any Linux machine and is frequently used on-premise,” the researchers add.
The good news is that Microsoft has shipped fixes for the issues as part of the September Patch Tuesday bundle, and Wiz urges all Azure users to ensure they are running patched versions of the OMI.