First published: Tue Nov 12 2024(Updated: )
Azure CycleCloud Remote Code Execution Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Azure CycleCloud | >=8.0.0<8.6.5 | |
Microsoft Azure CycleCloud | ||
Microsoft Azure CycleCloud | ||
Microsoft Azure CycleCloud | ||
Microsoft Azure CycleCloud | ||
Microsoft Azure CycleCloud | ||
Microsoft Azure CycleCloud | ||
Microsoft Azure CycleCloud | ||
Microsoft Azure CycleCloud | ||
Microsoft Azure CycleCloud | ||
Microsoft Azure CycleCloud | ||
Microsoft Azure CycleCloud | ||
Microsoft Azure CycleCloud | ||
Microsoft Azure CycleCloud | ||
Microsoft Azure CycleCloud | ||
Microsoft Azure CycleCloud | ||
Microsoft Azure CycleCloud | ||
Microsoft Azure CycleCloud | ||
Microsoft Azure CycleCloud |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-43602 is considered critical as it allows remote code execution through Azure CycleCloud.
To fix CVE-2024-43602, upgrade to a secure version of Azure CycleCloud, such as 8.6.5 or higher.
CVE-2024-43602 affects multiple versions from Azure CycleCloud 8.0.0 to 8.6.4.
Azure CycleCloud is a service for managing HPC workloads in Microsoft Azure that allows for the automated provisioning of clusters.
While the only definitive fix is to upgrade, users should limit access to Azure CycleCloud controls as a temporary mitigation.