top of page
Search

Zero-Day Security Alert — April 4, 2026: Five Critical Microsoft Azure Vulnerabilities Disclosed

  • Writer: Jacob Hughes
    Jacob Hughes
  • Apr 4
  • 3 min read

Five critical Microsoft Azure vulnerabilities (CVSS 9.1-10.0) were disclosed on April 3, 2026, affecting Azure AI Foundry, Azure Kubernetes Service, Azure Databricks, Azure Custom Locations, and Azure MCP Server. All are hosted-service vulnerabilities already addressed by Microsoft. Review your Azure audit logs and confirm no anomalous activity occurred prior to remediation.

Daily Security Briefing

April 4, 2026

CVE-2026-32213 | CVSS 10.0 | CRITICAL Severity | No Known Active Exploitation

Affected Product

Microsoft Azure AI Foundry (hosted service)

Description

Improper authorization in Azure AI Foundry allows an unauthorized attacker to elevate privileges over a network. The vulnerability has a perfect CVSS score of 10.0 with changed scope, meaning a successful exploit could impact resources beyond the vulnerable component. Attack complexity is low with no privileges or user interaction required.

Attack Vector

Network-based. No authentication, user interaction, or elevated privileges required. Low attack complexity. Scope is changed, meaning exploitation can affect resources beyond the vulnerable component.

Remediation

This is an exclusively hosted service vulnerability. Microsoft has already addressed this issue on their infrastructure. No customer action is required. Organizations using Azure AI Foundry should review audit logs for any anomalous privilege escalation activity prior to the fix date.

CISA Remediation Due Date: N/A

CVE-2026-33105 | CVSS 10.0 | CRITICAL Severity | No Known Active Exploitation

Affected Product

Microsoft Azure Kubernetes Service (hosted service)

Description

Improper authorization in Microsoft Azure Kubernetes Service allows an unauthorized attacker to elevate privileges over a network. Like CVE-2026-32213, this vulnerability scores a perfect 10.0 with changed scope, low complexity, and no authentication required.

Attack Vector

Network-based. No authentication, user interaction, or elevated privileges required. Low attack complexity. Changed scope with high impact to confidentiality, integrity, and availability.

Remediation

Exclusively hosted service vulnerability already addressed by Microsoft. No customer action required. AKS users should review cluster audit logs and Azure Activity logs for unauthorized privilege escalation attempts.

CISA Remediation Due Date: N/A

CVE-2026-33107 | CVSS 10.0 | CRITICAL Severity | No Known Active Exploitation

Affected Product

Microsoft Azure Databricks (hosted service)

Description

Server-side request forgery (SSRF) in Azure Databricks allows an unauthorized attacker to elevate privileges over a network. The SSRF flaw could allow attackers to access internal Azure services and metadata endpoints, potentially compromising data and infrastructure beyond the Databricks environment.

Attack Vector

Network-based SSRF. No authentication, user interaction, or elevated privileges required. Low attack complexity. Changed scope with full impact to confidentiality, integrity, and availability.

Remediation

Exclusively hosted service vulnerability already addressed by Microsoft. No customer action required. Databricks users should review workspace access logs and network activity for any signs of unauthorized SSRF-based access to internal endpoints.

CISA Remediation Due Date: N/A

CVE-2026-26135 | CVSS 9.6 | CRITICAL Severity | No Known Active Exploitation

Affected Product

Microsoft Azure Custom Locations Resource Provider (hosted service)

Description

Server-side request forgery (SSRF) in the Azure Custom Locations Resource Provider allows an authorized attacker to elevate privileges over a network. Unlike the other CVEs in this batch, this vulnerability requires low-level authentication (PR:L), but still achieves changed scope with high confidentiality and integrity impact.

Attack Vector

Network-based SSRF. Requires low-level authentication. No user interaction needed. Low attack complexity. Changed scope with high confidentiality and integrity impact.

Remediation

Exclusively hosted service vulnerability already addressed by Microsoft. No customer action required. Organizations using Azure Arc and Custom Locations should review access logs for unauthorized privilege escalation.

CISA Remediation Due Date: N/A

CVE-2026-32211 | CVSS 9.1 | CRITICAL Severity | No Known Active Exploitation

Affected Product

Microsoft Azure MCP Server (hosted service)

Description

Missing authentication for a critical function in the Azure MCP Server allows an unauthorized attacker to disclose information over a network. The lack of authentication on a critical endpoint means unauthenticated network access could lead to high-impact data exposure and integrity compromise.

Attack Vector

Network-based. No authentication, user interaction, or elevated privileges required. Low attack complexity. High impact to confidentiality and integrity.

Remediation

Exclusively hosted service vulnerability already addressed by Microsoft. No customer action required. Organizations using Azure MCP Server should review access and activity logs for unauthorized information disclosure attempts.

CISA Remediation Due Date: N/A

This report is generated automatically from NVD and CISA KEV data.

Recent Posts

See All

Comments


Contact

3056 S Camino Lagos

Grand Prairie, TX 75054

info@zilllabs.com

Be in the Know

Be notified of product additions, feature updates, promotions, and news/articles.  No spam. No selling. No sharing.

Follow us on

© 2026 by Zill IT Labs, LLC

bottom of page