Microsoft mitigated exposure of internal information in a storage account due to overly-permissive SAS token

Microsoft Security Header
Summary Summary As part of a recent Coordinated Vulnerability Disclosure (CVD) report from Wiz.io, Microsoft investigated and remediated an incident involving a Microsoft employee who shared a URL for a blob store in a public GitHub repository while contributing to open-source AI learning models. This URL included an overly-permissive Shared Access Signature (SAS) token for an internal storage account.

Source – Microsoft Security Response Center

All content and images belong to their respected owners, this article is curated for informational purposes only.

Total
0
Shares
Previous Post
Microsoft Security Header

Azure Serial Console Attack and Defense – Part 1

Next Post
Microsoft Security Header

Cybersecurity Awareness Month 2023: Elevating Security Together

Related Posts