Skip to main content

Microsoft says Azure users will have to patch these worrying security flaws themselves

Holographic representation of cloud computing over open businessman's hand
(Image credit: Shutterstock)

Microsoft’s latest guidelines regarding the recently disclosed OMI vulnerabilities has put the onus on users to patch many of the affected Azure services.

The September Patch Tuesday bundle shipped with fixes for four zero-day vulnerabilities in the open source software agent named Open Management Infrastructure (OMI), which is automatically deployed inside Linux virtual machines (VM) when users enable certain Azure services.

However, instead of patching all affected Azure services, Microsoft has put an advisory stating that while it’ll update six of them, seven others must be updated by users themselves.

TechRadar needs you!

We're looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won't take more than 60 seconds of your time, and we'd hugely appreciate if you'd share your experiences with us.

>> Click here to start the survey in a new window <<

“Customers must update vulnerable extensions for their Cloud and On-Premises deployments as the updates become available per schedule outlined in table below...For cloud deployments with auto update turned on, Microsoft will actively deploy the updates to extensions across Azure regions as per the schedule in the table below,” reads the advisory. 

High and dry

The Register points out that Microsoft’s handling of the situation hasn’t gone down well with security researchers.

“They’ve also failed to update their own systems in Azure to install the patched version on new VM deployments. It’s honestly jaw dropping,” tweeted security researcher Kevin Beaumont.

Since Microsoft has left it upon users to patch the impacted services, it didn’t take researchers long to discover vulnerable instances.

“There are 56 known exposed services worldwide that are likely vulnerable to this issue, including a major health organization and two major entertainment companies,” wrote security vendor Censys after performing an impact assessment. 

While the number seems small, Censys reasons it’s probably because of how the OMI service responds to such scans, or perhaps because exposing OMI to the internet likely requires deliberate effort.

In any case, since exploiting the vulnerability is a “laughably easy trick” according to Sophos, security researchers strongly urge users to patch any vulnerable OMI-using services in their Azure deployments without delay.

Via The Register

Mayank Sharma

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.