{"id":19289,"date":"2021-09-17T21:01:13","date_gmt":"2021-09-17T21:01:13","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=19289"},"modified":"2021-09-17T21:07:13","modified_gmt":"2021-09-17T21:07:13","slug":"attackers-exploit-azure-omigod-flaw","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/cloud\/attackers-exploit-azure-omigod-flaw\/","title":{"rendered":"Attackers Exploit OMIGOD Flaw in Azure Despite Microsoft Fixes"},"content":{"rendered":"<p>Cybercriminals are targeting Linux-based servers running Microsoft\u2019s Azure public cloud environment that are vulnerable to flaws after Microsoft didn&#8217;t automatically apply a patch on affected clients in its infrastructure.<\/p>\n<p>According to cybersecurity firm Recorded Future, the attacks began the night of Sept. 16 after a proof-of-concept exploit was published earlier in the day on GitHub. About 10 malicious servers have been searching the internet for vulnerable systems, and while the search began slowing, it has now ramped up to more than 100 sites by morning, Recorded Future <a href=\"https:\/\/therecord.media\/ddos-botnets-cryptominers-target-azure-systems-after-omigod-exploit-goes-public\/\">noted<\/a>, citing <a href=\"https:\/\/www.greynoise.io\/viz\/query\/?gnql=tags%3A%22Azure%20OMI%20RCE%20Attempt%22\">information<\/a> from threat intelligence vendor GreyNoise.<\/p>\n<p>In addition, Cado Security researchers in a <a href=\"https:\/\/www.cadosecurity.com\/azure-omi-vulnerability-omigod-cve-2021-38647-now-under-exploitation\/\">blog post<\/a> also noted a <a href=\"https:\/\/twitter.com\/GossiTheDog\/status\/1438832601221976065\">tweet<\/a> from cybersecurity researcher German Fernandez, who found that the infamous <a href=\"https:\/\/www.esecurityplanet.com\/threats\/cloudflare-mirai-botnet-ddos-attack\/\">DDoS Mirai botnet<\/a> \u2013 known for taking advantage of insecure Internet of Things (IoT) devices \u2013 also is exploiting OMIGOD. Mirai is putting a version of the botnet into a system and then closing the 5896 OMI SSL port, essentially stopping others from exploiting the same box.<\/p>\n<p>According to Cado researchers, the Mirai worm tries to spread to other systems via various vulnerabilities, including OMIGOD.<\/p>\n<p>\u201cThe race is on,\u201d Stuart Winter-Tear, director of strategy at threat model solutions maker ThreatModeler, told <em>eSecurity Planet<\/em>. \u201cAs this is now confirmed as being actively scanned and exploited in an automated fashion via botnets, and we know there is the potential for root privilege remote code execution, any open OMI ports must be closed as soon as possible and\u00a0<a href=\"https:\/\/msrc-blog.microsoft.com\/2021\/09\/16\/additional-guidance-regarding-omi-vulnerabilities-within-azure-vm-management-extensions\/\">Azure mitigation guidelines<\/a>\u00a0need to be implemented.\u201d<\/p>\n<h2>Large Number of Linux Servers Vulnerable<\/h2>\n<p>Security researchers from cybersecurity startup Wiz detected the <a href=\"https:\/\/www.esecurityplanet.com\/threats\/zero-day-threat\/\">zero-day vulnerabilities<\/a> \u2013 which they called OMIGOD \u201cbecause that was our reaction when we discovered them,\u201d Wiz Senior Security Researcher Nir Ohfeld wrote in a <a href=\"https:\/\/www.wiz.io\/blog\/secret-agent-exposes-azure-customers-to-unauthorized-code-execution\">blog post<\/a> \u2013 and <a href=\"https:\/\/www.wiz.io\/blog\/omigod-critical-vulnerabilities-in-omi-azure\">published<\/a> their findings Sept. 14.<\/p>\n<blockquote><p><span style=\"font-weight: 400;\">thousands of Azure customers and millions of endpoints are impacted by the flaws<\/span><\/p><\/blockquote>\n<p>The flaws include <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-38647\">CVE-2021-38647<\/a>, which is a remote code execution bug, and three privileged escalation vulnerabilities: <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-38648\">CVE-2021-8648<\/a>, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-38645\">CVE-2021-38645<\/a> and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-38649\">CVE-2021-38649<\/a>. Ohfeld wrote that the researchers offered a conservative estimate that thousands of Azure customers and millions of endpoints are impacted by the flaws.<\/p>\n<p>Wiz, which came out of stealth in December 2020 with $100 million in funding, analyzed a small number of Azure tenants and found that more than 65 percent were unknowingly at risk.<\/p>\n<p>\u201cSupply chain cyber attacks have disrupted everyday life and dominated headlines this year,\u201d he wrote. \u201cOne of the biggest challenges in preventing them is that our <a href=\"https:\/\/www.esecurityplanet.com\/networks\/the-secure-supply-chain-where-security-starts\/\">digital supply chain<\/a> is not transparent. If you don\u2019t know what\u2019s hidden in the services and products you use every day, how can you manage the risk?\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-19290\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/09\/OMIGOD-Microsoft.png\" alt=\"OMIGOD Microsoft\" width=\"600\" height=\"429\" \/><\/p>\n<p>Microsoft was quick to issue fixes to the four vulnerabilities in its <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/\">September release<\/a> of security updates.<\/p>\n<p>The vulnerabilities put a spotlight on the risk to supply chains that open-source code represents, particularly for organizations using cloud computing services, Ohfeld wrote.<\/p>\n<p>Further reading: <a href=\"https:\/\/www.esecurityplanet.com\/applications\/open-source-security-a-big-problem\/\">Open Source Security: A Big Problem<\/a><\/p>\n<h2>OMI Agent at the Center of OMIGOD<\/h2>\n<p>With OMIGOD, the issue is a relatively unknown app called Open Management Infrastructure (OMI), which is embedded in many Azure services. Microsoft sponsors the open-source OMI project in collaboration with The Open Group. Ohfeld described OMI as Windows Management Infrastructure (WMI) for Unix and Linux systems and Linux is the dominant OS running in Azure.<\/p>\n<p>Through OMI, organizations can collect statistics and sync configurations across their Azure environment and it&#8217;s used by such Azure services as Open Management Suite, Azure Insights and Azure Automation.<\/p>\n<p>\u201cWhen users enable any of these popular services, OMI is silently installed on their Virtual Machine, running at the highest privileges possible,\u201d he wrote. \u201cThis happens without customers\u2019 explicit consent or knowledge. Users simply click agree to log collection during setup and they have unknowingly opted in. Because Azure provides virtually no public documentation about OMI, most customers have never heard of it and are unaware that this attack surface exists in their environment.\u201d<\/p>\n<h2>Remote Code Execution is Most Serious Flaw<\/h2>\n<p>The OMI agent operates as a root with the highest privileges and any users can communicate with it using a Unix socket or through an HTTP API, when it\u2019s configured to allow external access. The three vulnerabilities with privilege escalation capabilities would allow bad actors to gain control of the servers. However, the vulnerability with remote code execution is the most serious flaw where OMI ports are accessible to the internet.<\/p>\n<p>\u201cThis vulnerability can be also used by attackers to obtain initial access to a target Azure environment and then move laterally within it,\u201d Ohfeld wrote in another <a href=\"https:\/\/www.wiz.io\/blog\/omigod-critical-vulnerabilities-in-omi-azure\">technical blog<\/a>. \u201cThus, an exposed HTTPS port is a holy grail for malicious attackers. With one simple exploit they can get access to new targets, execute commands at the highest privileges and possibly spread to new target machines.\u201d<\/p>\n<p>Recorded Future noted that Microsoft addressed the bug by developing version 1.6.8.1 of the OMI client and releasing it on GitHub, but didn\u2019t automatically install the update on OMI clients in its infrastructure, essentially leaving tens of thousands of servers vulnerable. The company also took three days to replace the OMI client version inside its Azure Linux VM images.<\/p>\n<p>The cybersecurity firm said a query on the Shodan search engine found more than 15,600 Azure Linux servers connected to the internet.<\/p>\n<h2>Open Source Software is Safe if Not Misused<\/h2>\n<p>Wiz\u2019s Ohfeld wrote that despite these vulnerabilities, open source software used by the community is vetted by thousands of experts and tends to be much more secure than proprietary software, though it can become a risk when misused.<\/p>\n<p>\u201cOne of the benefits of open source is that it\u2019s easy for developers to grab code from different projects and mix it with other open source and proprietary software,\u201d he wrote. \u201cAs a result, bad open-source code can wind up in an enormous range of products and services \u2013 inadvertently becoming a \u2018single point of failure.\u2019 Because customers don\u2019t know what franken-code is running in the background of the services they use, they remain at risk and unaware. \u201c<\/p>\n<p>Tyler Shields, chief marketing officer at security vendor JupiterOne, said finding such an underlying vulnerability in a management function of a cloud service provider is significant.<\/p>\n<p>\u201cTo understand their exposure to this vulnerability, enterprises need to know which assets have the OMI management function enabled and ensure that nothing is directly exposed to the internet,\u201d Shields told <em>eSecurity Planet<\/em>. \u201cYou may assume that two or three layers of firewalls protect these assets, but unfortunately, transitive trust relationships among assets can accidentally create a path that an attacker can exploit. A cloud-native attack-surface measurement tool that connects assets together in a relationship graph will tell you pretty quickly if any of those instances are actually exposed.\u201d<\/p>\n<h2>Risk-Reward in Cloud Security<\/h2>\n<p>The OMIGOD scenario highlights the risk-reward tradeoff of cloud services, according to Yaniv Bar-Dayan, co-founder and CEO of cybersecurity firm Vulcan Cyber.<\/p>\n<p>\u201cIT security teams trust cloud providers like Azure to provide a secure service, and in the event of a bug or vulnerability, to take immediate steps to mitigate the risk,\u201d Bar-Dayan told <em>eSecurity Planet<\/em>. \u201cIn almost all cases, the cloud providers we use remediate the vulnerabilities found in their services before they are exploited at scale. It typically takes a series of vulnerabilities to be left unaddressed by vendors and users for an advanced persistent threat to be successful.\u201d<\/p>\n<p>About 99 percent of cybersecurity breaches exploit a known and unmitigated vulnerability, he said. However, that doesn\u2019t apply to cloud services because providers like Microsoft and Amazon Web Services (AWS) are highly proactive about ensuring their products are clear of cybersecurity issues.<\/p>\n<p>\u201cThe real risk in cloud security stems from the fact that 95 percent of all cloud security breaches are due to user error and cloud service user misconfigurations,\u201d he said. \u201cWe plead with enterprise consumers of cloud services to make the security of the services they consume a top priority and be as proactive as the cloud service providers in their never-ending mitigation efforts.\u201d<\/p>\n<p>Wiz\u2019s Ohfeld noted that OMI is only one example of a relatively unknown software agent pre-installed and silently deployed in cloud environments and that these agents are in AWS and Google Cloud Platform as well as Azure.<\/p>\n<p>\u201cWe hope to raise awareness of the risks that come with unknown agents running with high privileges in cloud environments, particularly among Azure customers who are currently at risk until they update to the latest version of OMI,\u201d he wrote. \u201cWe urge the research community to continue to audit OMI and report issues they may find with similar agents.\u201d<\/p>\n<p>Further reading:<\/p>\n<p><a href=\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-security-best-practices\/\">Top 12 Cloud Security Best Practices for 2021<\/a><\/p>\n<p><a href=\"https:\/\/www.esecurityplanet.com\/products\/cloud-security-companies\/\">Top Cloud Security Companies &amp; Tools<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6ff7833cb3-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6ff7833cb3\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6ff7833cb3\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6ff7833cb3\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6ff7833cb3\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6ff7833cb3\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6ff7833cb3\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals are targeting Linux-based servers running Microsoft\u2019s Azure public cloud environment that are vulnerable to flaws after Microsoft didn&#8217;t automatically apply a patch on affected clients in its infrastructure. According to cybersecurity firm Recorded Future, the attacks began the night of Sept. 16 after a proof-of-concept exploit was published earlier in the day on GitHub. [&hellip;]<\/p>\n","protected":false},"author":256,"featured_media":18187,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[21],"tags":[],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[225],"class_list":["post-19289","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud","b2b_audience-awareness-and-consideration","b2b_product-cloud-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Attackers Exploit OMIGOD Flaw in Azure Despite Microsoft Fixes | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Linux-based servers running Microsoft\u2019s Azure are vulnerable to flaws after Microsoft didn&#039;t automatically apply a patch.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/cloud\/attackers-exploit-azure-omigod-flaw\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Attackers Exploit OMIGOD Flaw in Azure Despite Microsoft Fixes | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Linux-based servers running Microsoft\u2019s Azure are vulnerable to flaws after Microsoft didn&#039;t automatically apply a patch.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/cloud\/attackers-exploit-azure-omigod-flaw\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-17T21:01:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-17T21:07:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/02\/cloud-computing-scaled-e1613175470167.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"1800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jeff Burt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Burt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/attackers-exploit-azure-omigod-flaw\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/attackers-exploit-azure-omigod-flaw\/\"},\"author\":{\"name\":\"Jeff Burt\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\"},\"headline\":\"Attackers Exploit OMIGOD Flaw in Azure Despite Microsoft Fixes\",\"datePublished\":\"2021-09-17T21:01:13+00:00\",\"dateModified\":\"2021-09-17T21:07:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/attackers-exploit-azure-omigod-flaw\/\"},\"wordCount\":1445,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/attackers-exploit-azure-omigod-flaw\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/02\/cloud-computing-scaled-e1613175470167.jpg\",\"articleSection\":[\"Cloud\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/attackers-exploit-azure-omigod-flaw\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/cloud\/attackers-exploit-azure-omigod-flaw\/\",\"name\":\"Attackers Exploit OMIGOD Flaw in Azure Despite Microsoft Fixes | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/attackers-exploit-azure-omigod-flaw\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/attackers-exploit-azure-omigod-flaw\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/02\/cloud-computing-scaled-e1613175470167.jpg\",\"datePublished\":\"2021-09-17T21:01:13+00:00\",\"dateModified\":\"2021-09-17T21:07:13+00:00\",\"description\":\"Linux-based servers running Microsoft\u2019s Azure are vulnerable to flaws after Microsoft didn't automatically apply a patch.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/attackers-exploit-azure-omigod-flaw\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/cloud\/attackers-exploit-azure-omigod-flaw\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/attackers-exploit-azure-omigod-flaw\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/02\/cloud-computing-scaled-e1613175470167.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/02\/cloud-computing-scaled-e1613175470167.jpg\",\"width\":1200,\"height\":1800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/attackers-exploit-azure-omigod-flaw\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Attackers Exploit OMIGOD Flaw in Azure Despite Microsoft Fixes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\",\"name\":\"Jeff Burt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"caption\":\"Jeff Burt\"},\"description\":\"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jburt\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Attackers Exploit OMIGOD Flaw in Azure Despite Microsoft Fixes | eSecurity Planet","description":"Linux-based servers running Microsoft\u2019s Azure are vulnerable to flaws after Microsoft didn't automatically apply a patch.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/cloud\/attackers-exploit-azure-omigod-flaw\/","og_locale":"en_US","og_type":"article","og_title":"Attackers Exploit OMIGOD Flaw in Azure Despite Microsoft Fixes | eSecurity Planet","og_description":"Linux-based servers running Microsoft\u2019s Azure are vulnerable to flaws after Microsoft didn't automatically apply a patch.","og_url":"https:\/\/www.esecurityplanet.com\/cloud\/attackers-exploit-azure-omigod-flaw\/","og_site_name":"eSecurity Planet","article_published_time":"2021-09-17T21:01:13+00:00","article_modified_time":"2021-09-17T21:07:13+00:00","og_image":[{"width":1200,"height":1800,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/02\/cloud-computing-scaled-e1613175470167.jpg","type":"image\/jpeg"}],"author":"Jeff Burt","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Burt","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/cloud\/attackers-exploit-azure-omigod-flaw\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/cloud\/attackers-exploit-azure-omigod-flaw\/"},"author":{"name":"Jeff Burt","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e"},"headline":"Attackers Exploit OMIGOD Flaw in Azure Despite Microsoft Fixes","datePublished":"2021-09-17T21:01:13+00:00","dateModified":"2021-09-17T21:07:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/cloud\/attackers-exploit-azure-omigod-flaw\/"},"wordCount":1445,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/cloud\/attackers-exploit-azure-omigod-flaw\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/02\/cloud-computing-scaled-e1613175470167.jpg","articleSection":["Cloud"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/cloud\/attackers-exploit-azure-omigod-flaw\/","url":"https:\/\/www.esecurityplanet.com\/cloud\/attackers-exploit-azure-omigod-flaw\/","name":"Attackers Exploit OMIGOD Flaw in Azure Despite Microsoft Fixes | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/cloud\/attackers-exploit-azure-omigod-flaw\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/cloud\/attackers-exploit-azure-omigod-flaw\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/02\/cloud-computing-scaled-e1613175470167.jpg","datePublished":"2021-09-17T21:01:13+00:00","dateModified":"2021-09-17T21:07:13+00:00","description":"Linux-based servers running Microsoft\u2019s Azure are vulnerable to flaws after Microsoft didn't automatically apply a patch.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/cloud\/attackers-exploit-azure-omigod-flaw\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/cloud\/attackers-exploit-azure-omigod-flaw\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/cloud\/attackers-exploit-azure-omigod-flaw\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/02\/cloud-computing-scaled-e1613175470167.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/02\/cloud-computing-scaled-e1613175470167.jpg","width":1200,"height":1800},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/cloud\/attackers-exploit-azure-omigod-flaw\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Attackers Exploit OMIGOD Flaw in Azure Despite Microsoft Fixes"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e","name":"Jeff Burt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","caption":"Jeff Burt"},"description":"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.","url":"https:\/\/www.esecurityplanet.com\/author\/jburt\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/19289"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/256"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=19289"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/19289\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/18187"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=19289"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=19289"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=19289"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=19289"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=19289"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=19289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}