“Intruders” in the cloud: Microsoft warns “thousands” of Azure customers about potential exposure

On Thursday, the company sent warnings to “Thousands” of its cloud computing customers, explaining that “Intruders” could have access to their databases, according to Reuters.

On Thursday, Microsoft alerted cloud customers that uninvited guests could have access to their databases, according to Reuters.

On Thursday, Microsoft sent warnings to “Thousands” of the company’s cloud computing customers, explaining that “Intruders could have the ability to read, change or even delete their main databases,” according to a Reuters report published the same day citing a cybersecurity researcher and a copy of the warning email.

Researchers at the cybersecurity company Wiz found the vulnerability in Microsoft Azure’s Cosmos DB database, according to Reuters, and were “Able to access keys that control access to databases held by thousands of companies.” Since Microsoft is unable to change these keys, Reuters said the company emailed customers directing them to make new keys.

The Microsoft warning to customers said the company had “No indication that external entities outside the researcher had access to the primary read-write key,” according to Reuters.

The Wiz team discovered the flaw in Jupyter Notebook earlier this month and alerted Microsoft a few days later and the company was paid $40,000 for finding the vulnerability, according to Reuters.

Share this article on social media:

Subscribe to Our Newsletter!
Stay on top of cybersecurity risks, evolving threats and industry news.
This field is for validation purposes and should be left unchanged.

The Latest Cybersecurity News

From major cyberattacks, newly discovered critical vulnerabilities to recommended best practices, read it here first:
GET STARTED TODAY

Tell us About your Needs
Get an Answer the Same Business Day

Got an urgent request? Call us at 1-877-805-7475 or Book a meeting.

What happens next:

A Vumetric expert will contact you to learn more about your cybersecurity needs and goals.

The project's scope will be defined (Target environment, deadlines, requirements, etc.)

A detailed quote including all-inclusive pricing and statement of work is sent to you.

PCI-DSS
This field is for validation purposes and should be left unchanged.
2024 EDITION

PENETRATION TESTING Buyer's Guide

Everything You Need to Know

Gain confidence in your future cybersecurity assessments by learning to effectively plan, scope and execute projects.

BOOK A MEETING

Enter your Email Address

This field is for validation purposes and should be left unchanged.

* No free email provider (e.g: gmail.com, hotmail.com, etc.)

This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.