The Cybersecurity and Infrastructure Security Agency (CISA) is urging all users of Microsoft’s Azure Cosmos DB database service to regenerate their certificate keys, following the discovery of a serious security flaw that could hand over control of the databases to unauthorized individuals.
The Cosmos DB flaw was discovered by cloud infrastructure security company Wiz, who were able to exploit a vulnerability in the service’s Jupyter Notebook implementation, which gave attackers access to the database’ primary keys and other highly sensitive secrets such as its blob storage access token.
Upon being notified, Microsoft quickly disabled Jupyter, and emailed a section of its users to rotate their keys. The CISA however suggests all Cosmos DB to follow this precautionary step.
We're looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won't take more than 60 seconds of your time, and we'd hugely appreciate if you'd share your experiences with us.
- These are the best endpoint protection tools
- We’ve rounded up the best cloud databases on the market
- Also check our list of the best cloud hosting on the market
“Although the misconfiguration appears to have been fixed within the Azure cloud, CISA strongly encourages Azure Cosmos DB customers to roll and regenerate their certificate keys and to review Microsoft’s guidance on how to Secure access to data in Azure Cosmos DB,” notes CISA in its advisory.
Don’t take it lightly
According to the Wiz researchers, the flaw would equip threat actors with everything they need to access and exercise full read/write/delete control over the database from across the internet.
In a blog post, Microsoft said that its investigation indicated that “no customer data was accessed because of this vulnerability,” adding that they’ve notified the customers whose keys may have been affected by the researchers.
However, the Wiz researchers sided with CISA’s directive that extended the advisory to all Cosmos DB users, since it’s difficult to gauge the true impact of the vulnerability.
"In my estimation, it's really hard for them, if not impossible, to completely rule out that someone used this before," Wiz Chief Technology Officer Ami Luttwak told Reuters.
- Check our list of the best cloud computing services right now
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.