CVE-2025-49707
BaseFortify
Publication date: 2025-08-12
Last updated on: 2025-08-20
Assigner: Microsoft Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| microsoft | ecesv6-series_azure_vm_firmware | * |
| microsoft | ecesv6-series_azure_vm | * |
| microsoft | dcesv6-series_azure_vm_firmware | * |
| microsoft | dcesv6-series_azure_vm | * |
| microsoft | nccadsh100v5-series_azure_vm_firmware | * |
| microsoft | nccadsh100v5-series_azure_vm | * |
| microsoft | ecedsv5-series_azure_vm_firmware | * |
| microsoft | ecedsv5-series_azure_vm | * |
| microsoft | ecesv5-series_azure_vm_firmware | * |
| microsoft | ecesv5-series_azure_vm | * |
| microsoft | dcedsv5-series_azure_vm_firmware | * |
| microsoft | dcedsv5-series_azure_vm | * |
| microsoft | dcesv5-series_azure_vm_firmware | * |
| microsoft | dcesv5-series_azure_vm | * |
| microsoft | ecadsv5-series_azure_vm_firmware | * |
| microsoft | ecadsv5-series_azure_vm | * |
| microsoft | ecasv5-series_azure_vm_firmware | * |
| microsoft | ecasv5-series_azure_vm | * |
| microsoft | dcadsv5-series_azure_vm_firmware | * |
| microsoft | dcadsv5-series_azure_vm | * |
| microsoft | dcasv5-series_azure_vm_firmware | * |
| microsoft | dcasv5-series_azure_vm | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-Other | |
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an improper access control issue in Azure Virtual Machines that allows an authorized attacker to perform spoofing locally. This means someone with some level of access can impersonate or masquerade as another entity within the system.
How can this vulnerability impact me? :
The vulnerability can lead to serious impacts including high confidentiality and integrity risks, as an attacker could spoof identities locally within Azure Virtual Machines. This could result in unauthorized access to sensitive information or manipulation of data, potentially compromising system trustworthiness.