Microsoft has developed a brand new option to maintain prospects knowledgeable about safety vulnerabilities that have an effect on their Azure sources. When a vulnerability is disclosed that impacts their sources, prospects will likely be notified by way of Service Well being within the Azure Portal. This Service Well being message will embody details about the vulnerability’s widespread vulnerabilities and exposures quantity (CVE), severity, and steps prospects can take to safeguard in opposition to it. Normally, it would additionally embody an inventory of the particular sources of their subscription that prospects have to take motion on.
Our aim is to offer a extra constant and dependable expertise for purchasers. Latest improvements in Azure Service Well being now permit us to ship communications with impacted sources and goal messaging at tenant admins. With these new improvements, we are able to leverage present work completed by the Microsoft Safety Response Middle (MSRC) in vulnerability reporting to deliver actionable data to prospects that’s tailor-made to their distinctive setting.
Under is an outline of how Microsoft discloses new vulnerabilities, the place to seek out messages concerning CVEs in Azure Service Well being, and methods to perceive the content material in a Service Well being message.
About vulnerabilities at Microsoft
Microsoft discloses a variety of vulnerabilities each month throughout the spectrum of Microsoft product teams, together with Home windows, Microsoft 365, and Azure. When these vulnerabilities are publicly disclosed and require buyer motion, they’re assigned a CVE quantity and revealed within the Safety Replace Information by the Microsoft Safety Response Middle (MSRC).
Prospects can be taught extra about how Microsoft collaborates with the safety analysis neighborhood to determine and mitigate vulnerabilities within the Anatomy of a Cloud-Service Safety Replace weblog from MSRC.
A CVE signifies that motion is required from prospects as a way to stay safe. Every time a vulnerability is disclosed that impacts an Azure services or products, the Azure communications group collaborates with MSRC and product engineering to make sure that weak prospects are notified of any actions they should take to mitigate the vulnerability. Like communications concerning ongoing outages or upcoming upkeep, these notifications are revealed to Service Well being within the Azure Portal.
Observe that, even when we message prospects concerning a CVE, this doesn’t point out any abuse, exploitation, or hacking has occurred. Whereas vulnerabilities are widespread, these are sometimes reported and stuck earlier than any risk actor can exploit them or manipulate buyer information.
Service Well being messages for Azure CVEs
The place to seek out messages for Azure CVEs
Advisories for newly disclosed CVEs will seem underneath the Safety advisories blade in Service Well being within the Azure Portal. The title of those communications will usually lead with “[Action Required]” and embody the CVE quantity. From right here, prospects can click on the title of the message and drill down into the message contents.
We are going to solely ship communications to prospects that both have sources which are weak to the CVE or who in any other case have to take some type of motion to remediate. If a given CVE impacts Azure App Service ASP.NET deployments, for instance, you received’t obtain a message should you don’t have any App Service sources or in case your App Service sources solely include Python internet apps. On uncommon events, it might be tougher for us to find out which particular sources are weak to a given CVE. In such circumstances, we could ship a CVE notification to an approximate set of shoppers. If we publish messaging to an approximate set of shoppers, we intention to incorporate steerage that prospects can observe to validate whether or not they have sources deployed which are weak to the CVE.
How you can learn messages for Azure CVEs
Service Well being messages for Azure CVEs usually include three components:
- An summary of the CVE.
- A abstract of the motion required from prospects.
- Hyperlinks to further help.
The opening portion of the message will give prospects a high-level overview of the vulnerability, widespread vulnerability scoring system (CVSS) rating, impression, and severity as outlined within the CVE itself. This part may even clarify which Azure companies or options are weak to this CVE and embody a hyperlink to the CVE within the Safety Replace Information.
The Motion Required part dives into the steerage for purchasers to safeguard in opposition to the particular vulnerability. Within the Service Well being message, we could present a summarized model of the mitigation steps for fast reference, however prospects are inspired to discuss with the Safety Replace Information for hyperlinks to the suitable sources wanted to mitigate, together with documentation and replace packages.
Lastly, the Further Assist part consists of hyperlinks to sources that prospects can discuss with as a way to open a help case and configure alerting in Service Well being. Prospects who’ve questions concerning a CVE past the knowledge supplied within the Service Well being message, or want additional help in making use of mitigation steps, are inspired to open a help case by way of the Azure Portal.
We attempt to offer the identical degree of element from message to message, whatever the perceived impression of the vulnerability. A CVSS 8.0 could imply one thing completely different for a buyer internet hosting an e-commerce web site on a digital machine (VM) scale set than for a buyer utilizing one VM to host a Minecraft server as a sandbox for his or her associates. As such, our aim is to offer the required data for purchasers to make an knowledgeable choice about methods to method their safety. We at all times encourage prospects to observe the advisable steerage supplied as quickly as potential and observe safety finest practices.

Who can learn Service Well being messages concerning Azure CVEs?
Normally, we’ll goal a Service Well being message concerning an Azure CVE to the particular subscriptions with sources recognized as weak or the place prospects have to take some motion. Any consumer with reader privileges within the subscription will be capable to navigate to Service Well being and examine the message.
On some events, we could goal the message to specific tenants if the vulnerability impacts customers on the tenant degree. In such circumstances, solely tenant admins, or roles with tenant admin entry, will be capable to view the message after toggling their view for tenant-level occasions. Communications for tenant-level occasions are solely accessible within the new Azure Portal expertise.
Impacted sources and Service Well being alerts
For these circumstances the place we are able to determine particular sources which may be weak to a given CVE, a brand new function of Azure Service Well being permits us to give you details about the sources in your subscription that will require motion. Prospects can view this data by clicking the “Impacted Assets” tab in the direction of the highest of the message subsequent to the “Abstract” tab. The useful resource data supplied can vary from a selected useful resource ID (together with useful resource group and useful resource title) to the present runtime model and will range relying on the character of the vulnerability. For extra details about the brand new Service Well being expertise, see our documentation about useful resource impression from Azure safety incidents.
Moreover, prospects can configure Service Well being alerts for his or her Azure sources. Service Well being alerts will notify you thru your most popular notification channel comparable to SMS and e-mail when your sources are affected by a platform occasion. These alerts could be configured for various kinds of occasions, from safety occasions to outages to deliberate upkeep updates.

What about third-party CVEs that have an effect on Microsoft merchandise?
These circumstances are uncommon, however they do occur often. There are two major conditions by which this may occur:
- When a non-Microsoft product accommodates a vulnerability, however that product is used as an underlying element of a Microsoft providing (ex. sure open-source software program).
- When an providing from an Unbiased Software program Vendor (ISV) bought on the Azure Market accommodates a vulnerability.
In such circumstances, Microsoft wouldn’t launch the CVE, however fairly the disclosure of the CVE could be completed by the third get together that owns the weak software program. Regardless, Microsoft could publish our personal messaging concerning third get together CVEs to Azure Service Well being.
If a third get together CVE has a downstream impression on a Microsoft services or products, we could publish messaging to affected prospects to boost consciousness and inform them of any motion they should take.
If a CVE is disclosed that impacts an providing on the Azure Market, Microsoft could message prospects utilizing that providing on the request of the ISV or if we decide there’s some imminent danger to our prospects. Basically, for CVEs affecting choices on the Azure Market, prospects are inspired to work with the related ISV for questions concerning the safety of their providing.
Keep up to date on safety occasions
To summarize, these are the important thing issues to remember concerning how Microsoft retains prospects knowledgeable about vulnerabilities affecting Azure Providers:
- Prospects recognized as weak to a given CVE will likely be notified by way of Service Well being within the Azure Portal.
- In some circumstances, we could not be capable to determine a exact set of affected prospects. In such circumstances, we could goal an approximate set of shoppers with messaging.
- We intention to incorporate details about the particular sources in a buyer’s subscription which may be weak and should be up to date.
- If we’re unable to offer details about particular affected sources, we’ll present steps that prospects can observe to verify for weak sources inside their subscription.
- Disclosure of a CVE, or receipt of a message in Service Well being concerning a CVE, doesn’t entail that any abuse or exploitation has taken place.
- The Safety Replace Information from MSRC is the place new vulnerabilities are disclosed by Microsoft. CVEs within the Safety Replace Information usually embody details about its exploitability and hyperlinks to the required safety updates to stay safeguarded in opposition to it.
Prospects are extremely inspired to configure Service Well being alerts to be notified when a platform occasion impacts their Azure sources. You possibly can obtain alerts by way of your most popular channel, together with SMS, e-mail, and webhook. Microsoft values our ongoing collaboration with the safety analysis neighborhood to determine vulnerabilities in our services and products. We encourage all researchers to work with distributors underneath Coordinated Vulnerability Disclosure (CVD) and abide by the guidelines of engagement for penetration testing to keep away from impacting buyer information whereas conducting safety analysis.