CVE-2026-35428
Microsoft · Azure Cloud Shell
A command injection vulnerability in Azure Cloud Shell allows an unauthorized attacker to perform spoofing over a network.
Executive summary
An unauthorized command injection flaw in Azure Cloud Shell poses a critical risk by allowing attackers to execute commands and perform spoofing.
Vulnerability
This vulnerability is caused by improper neutralization of special elements used in a command, allowing an unauthenticated attacker to inject malicious commands into the environment.
Business impact
A CVSS score of 9.6 underscores the severity of this vulnerability, as it allows attackers to bypass intended security constraints. Successful exploitation could lead to full control over the Cloud Shell session, enabling lateral movement within the Azure tenant or the deployment of malicious resources.
Remediation
Immediate Action: Update Azure Cloud Shell to the latest version as provided by Microsoft.
Proactive Monitoring: Monitor Cloud Shell usage logs for unusual or unauthorized command strings and unexpected session activity.
Compensating Controls: Restrict access to Cloud Shell to authorized personnel only and utilize Azure Policy to enforce tighter security controls on user sessions.
Exploitation status
Public Exploit Available: No
Analyst recommendation
Apply the vendor-provided updates immediately. Due to the potential for command injection and spoofing, perform a thorough review of existing Cloud Shell sessions to identify any signs of unauthorized interaction.