This vulnerability allows local attackers to disclose sensitive information on Microsoft Azure. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the DSIMountAgent service, which listens on TCP port 46802 by default. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to disclose sensitive information, leading to further compromise.
Microsoft has issued an update to correct this vulnerability. More details can be found at:
| Nitesh Surana (@_niteshsurana) of Project Nebula, Trend Micro Research