Gallery

Contacts

411 University St, Seattle, USA

engitech@oceanthemes.net

+1 -800-456-478-23

A security researcher discovered that Azure Backup for AKS could be exploited to escalate a low-privilege Backup Contributor identity to full cluster-admin control over any targeted AKS cluster, without any direct Kubernetes permissions. Microsoft rejected the vulnerability report, blocked CVE assignment, and publicly denied changes, yet the attack path ceased to work and new permission validation logic appeared in the service, indicating a silent, unacknowledged fix. The incident signals a broader governance risk: when cloud vendors remediate silently and deny disclosure, security teams lose the audit trail needed to assess exposure windows, verify remediation, and meet compliance obligations.

Author

Tech Jacks Solutions