Google Releases Patches for 47 Android Security Flaws, Including Actively Exploited CVE-2024-53104
February 4, 2025FormBook Malware – Active IOCs
February 4, 2025Google Releases Patches for 47 Android Security Flaws, Including Actively Exploited CVE-2024-53104
February 4, 2025FormBook Malware – Active IOCs
February 4, 2025Severity
High
Analysis Summary
Microsoft has released security patches addressing two critical vulnerabilities affecting Azure AI Face Service and Microsoft Account, both of which could allow attackers to escalate privileges under specific conditions. The first flaw, CVE-2025-21396, has a CVSS score of 7.5 and is caused by missing authorization, potentially enabling an unauthorized attacker to elevate their privileges over a network. The second, CVE-2025-21415, is far more severe with a CVSS score of 9.9, stemming from an authentication bypass in Azure AI Face Service, which allows an authorized attacker to escalate privileges remotely. While the vulnerabilities pose a significant security risk, Microsoft has fully mitigated them and confirmed that no customer action is required.
Microsoft credited an anonymous researcher for discovering CVE-2025-21415 and a security researcher known as "Sugobet" for reporting CVE-2025-21396. Additionally, the company acknowledged the existence of a proof-of-concept (PoC) exploit for CVE-2025-21415, suggesting that attackers had some means to exploit the flaw before mitigation. However, Microsoft has reassured users that both vulnerabilities have been addressed, and there is no immediate risk. This proactive disclosure highlights the increasing need for security in cloud-based services, as such flaws could have potentially devastating consequences if left unpatched.
These advisories are part of Microsoft’s broader transparency initiative, aimed at improving cybersecurity awareness for cloud-based platforms. The company now issues Common Vulnerabilities and Exposures (CVEs) for cloud vulnerabilities even when customers don’t need to take direct action, ensuring that security professionals are informed of potential threats. This shift acknowledges the growing risks associated with cloud computing and reinforces Microsoft's commitment to securing its ecosystem by making security flaws public, even if they are quickly mitigated.
Microsoft emphasized that by openly disclosing security flaws and their fixes noted, it helps partners, researchers, and the broader cybersecurity community improve overall security standards. The company’s statement from June 2024 reinforces this, stressing that transparency fosters collaboration and enhances the safety of critical infrastructure. As cloud adoption accelerates, addressing vulnerabilities in a timely and open manner remains essential in mitigating risks and reinforcing trust in cloud services.
Impact
- Privilege Escalation
- Security Bypass
Indicators of Compromise
CVE
CVE-2025-21396
CVE-2025-21415
Affected Vendors
Remediation
- Ensure all systems using Azure AI Face Service and Microsoft Account are updated to the latest versions including the patches for CVE-2025-21396 and CVE-2025-21415.
- Keep an eye on any unusual network activity or signs of privilege escalation attempts, particularly for systems interacting with Azure AI Face Service and Microsoft Account services.
- Reinforce network-level security by ensuring proper authentication mechanisms and permissions are in place, especially in cloud-based environments, to limit unauthorized access.
- Continuously review security logs and audit trails to detect any potential exploitation attempts for both vulnerabilities.
- Stay updated on further security advisories and engage with Microsoft to stay informed about potential emerging threats related to these vulnerabilities.
- Consider segmenting services that interact with Azure AI Face Service and Microsoft Account to limit the potential impact of an attack.
- If working with clients or partners, communicate the urgency of applying these patches to ensure their environments remain secure from exploitation attempts.