The September Patch Tuesday bundle shipped with fixes for four zero-day vulnerabilities in the open source software agent named Open Management Infrastructure (OMI), which is automatically deployed inside Linux virtual machines (VM) when users enable certain Azure services.
However, instead of patching all affected Azure services, Microsoft has put an advisory stating that while it’ll update six of them, seven others must be updated by users themselves.
We're looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won't take more than 60 seconds of your time, and we'd hugely appreciate if you'd share your experiences with us.
- We've built a list of the best cloud computing services available
- These are the best endpoint protection tools
- Check our list of the best firewall apps and services
“Customers must update vulnerable extensions for their Cloud and On-Premises deployments as the updates become available per schedule outlined in table below...For cloud deployments with auto update turned on, Microsoft will actively deploy the updates to extensions across Azure regions as per the schedule in the table below,” reads the advisory.
High and dry
The Register points out that Microsoft’s handling of the situation hasn’t gone down well with security researchers.
“They’ve also failed to update their own systems in Azure to install the patched version on new VM deployments. It’s honestly jaw dropping,” tweeted security researcher Kevin Beaumont.
Since Microsoft has left it upon users to patch the impacted services, it didn’t take researchers long to discover vulnerable instances.
“There are 56 known exposed services worldwide that are likely vulnerable to this issue, including a major health organization and two major entertainment companies,” wrote security vendor Censys after performing an impact assessment.
While the number seems small, Censys reasons it’s probably because of how the OMI service responds to such scans, or perhaps because exposing OMI to the internet likely requires deliberate effort.
In any case, since exploiting the vulnerability is a “laughably easy trick” according to Sophos, security researchers strongly urge users to patch any vulnerable OMI-using services in their Azure deployments without delay.
- Protect your devices with these best antivirus software
Via The Register
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.