{"id":11347,"date":"2021-08-30T08:58:22","date_gmt":"2021-08-30T06:58:22","guid":{"rendered":"https:\/\/whiteduck.de\/?p=11347"},"modified":"2021-11-25T15:40:19","modified_gmt":"2021-11-25T14:40:19","slug":"critical-vulnerability-in-azure-cosmos-db-act-now","status":"publish","type":"post","link":"https:\/\/whiteduck.de\/en\/critical-vulnerability-in-azure-cosmos-db-act-now\/","title":{"rendered":"Critical vulnerability in Azure Cosmos DB &#8211; Act now!"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><\/div><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 1170px + 0px );margin-left: calc(-0px \/ 2 );margin-right: calc(-0px \/ 2 );\"><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;width:100%;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-one\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h1 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:32;line-height:1.31;\"><\/p>\n<p>Critical vulnerability in Azure Cosmos DB &#8211; Act now!<\/p>\n<p><\/h1><\/div><div class=\"fusion-text fusion-text-1\"><\/div><\/p>\n\n\n<p>Last Thursday, August 26, Microsoft informed thousands of its Azure customers about a critical vulnerability in their cloud offering <a href=\"https:\/\/docs.microsoft.com\/azure\/cosmos-db\/introduction\" target=\"_blank\" rel=\"noreferrer noopener\">Cosmos DB<\/a>. <a href=\"https:\/\/www.wiz.io\/\" target=\"_blank\" rel=\"noreferrer noopener\">Wiz<\/a>, the company that found the <a href=\"https:\/\/chaosdb.wiz.io\/\" target=\"_blank\" rel=\"noreferrer noopener\">#ChaosDB<\/a> security vulnerability, was able to extract any other Cosmos DB customer&#8217;s primary key via the <a href=\"https:\/\/docs.microsoft.com\/azure\/cosmos-db\/cosmosdb-jupyter-notebooks\" target=\"_blank\" rel=\"noreferrer noopener\">Jupyter Notebook integration<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What happened<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>On August 9 the research team of Wiz found the security vulnerability in the Jupyter Notebook integration of Azure Cosmos DB<\/li><li>On August 12 Wiz informed Microsoft about the security issue<\/li><li>Microsoft&#8217;s security team took immediate action and disabled the vulnerable feature within 48 hours<\/li><li>On August 26 Microsoft informed potential customers<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">The Vulnerability<\/h3>\n\n\n\n<p>Wiz was able to exploit a chain of security vulnerabilities in the Jupyter Notebook integration of Azure Cosmos DB. By doing so, they were able to obtain a set of credentials related to the Cosmos DB account, the Jupyter Notebook compute resource, and the Jupyter Notebook Storage Account, including the primary key. With these credentials, Wiz was able to view, modify, and delete data in the Cosmos DB account.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img class=\"lazyload\" decoding=\"async\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-orig-src=\"https:\/\/chaosdb.wiz.io\/img\/diagram.gif\" alt=\"Attack diagram\"\/><figcaption>Wiz, <a href=\"https:\/\/chaosdb.wiz.io\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/chaosdb.wiz.io<\/a><\/figcaption><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Am I impacted?<\/h3>\n\n\n\n<p>If your organization is using Cosmos DB it is likely that you are impacted by this vulnerability. Every Cosmos DB account that uses the notebook feature, or has been created after January 2021, is potentially at risk. You can review your Cosmos DB account notifications to verify whether you are impacted.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img class=\"lazyload\" decoding=\"async\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-orig-src=\"https:\/\/pbs.twimg.com\/media\/E9-YTMKXIAEjrwT?format=jpg&amp;name=4096x4096\" alt=\"Image\"\/><\/figure><\/div>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>&#8220;Microsoft notified only customers that were affected during our short research period (around a week). We think the actual number of potentially impacted customers is much larger and probably includes the majority of Cosmos DB customers, as the vulnerability has been present for months.&#8221;<\/p><cite>Wiz, <a href=\"https:\/\/chaosdb.wiz.io\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/chaosdb.wiz.io<\/a><\/cite><\/blockquote>\n\n\n\n<p>Furthermore, Wiz mentions that Microsoft has no indication that external entities outside of the researchers of Wiz had access to the primary key of Azure Cosmos DB accounts. Microsoft is also not aware of any data access because of this vulnerability as mentioned <a href=\"https:\/\/chaosdb.wiz.io\/\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>. <\/p>\n\n\n\n<p>Azure Cosmos DB accounts with virtual network integration or firewall enabled are also protected from any unauthorized access. That said, the secret itself might have been compromised. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Act now!<\/h3>\n\n\n\n<p>As mentioned <a href=\"https:\/\/whiteduck.de\/recap-microsoft-devops-forum-2021-devops-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft<\/a> disabled the vulnerable<span style=\"font-size: revert; letter-spacing: 0px;\"> feature within 48 hours<\/span>. This means the vulnerability cannot be actively exploited anymore. <\/p>\n\n\n\n<p>Due to the primary key being a long-lived secret you will have to recreate or manually rotate it. Based on your current implementation you might be able to rotate the primary key without any downtime. You will find further details on how to recreate and rotate your key in the <a href=\"https:\/\/docs.microsoft.com\/azure\/cosmos-db\/secure-access-to-data?tabs=using-primary-key\" target=\"_blank\" rel=\"noreferrer noopener\">Cosmos DB documentation<\/a>. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Further improve security<\/h3>\n\n\n\n<p>You can further improve the security of your Cosmos DB account by implementing one of the following network security features:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Enable the <a href=\"https:\/\/docs.microsoft.com\/azure\/cosmos-db\/how-to-configure-firewall\" target=\"_blank\" rel=\"noreferrer noopener\">IP firewall feature<\/a> to only allow certain IPs to access your Cosmos DB account<\/li><li>Restrict access to your Cosmos DB account to <a href=\"https:\/\/docs.microsoft.com\/azure\/cosmos-db\/how-to-configure-vnet-service-endpoint\" target=\"_blank\" rel=\"noreferrer noopener\">virtual networks<\/a> in your environment<\/li><li>Configure a fully private Cosmos DB account by using <a href=\"https:\/\/docs.microsoft.com\/azure\/cosmos-db\/how-to-configure-private-endpoints\" target=\"_blank\" rel=\"noreferrer noopener\">Private Link<\/a><\/li><\/ul>\n\n\n\n<p>Furthermore, you should rotate your Cosmos DB account keys on a regular basis. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">More details<\/h3>\n\n\n\n<p>You will find more details on the ChaosDB Vulnerability here:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/chaosdb.wiz.io\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/chaosdb.wiz.io<\/a><\/li><li><a href=\"https:\/\/www.wiz.io\/blog\/chaosdb-how-we-hacked-thousands-of-azure-customers-databases\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.wiz.io\/blog\/chaosdb-how-we-hacked-thousands-of-azure-customers-databases<\/a><\/li><li><a href=\"https:\/\/www.reuters.com\/technology\/exclusive-microsoft-warns-thousands-cloud-customers-exposed-databases-emails-2021-08-26\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.reuters.com\/technology\/exclusive-microsoft-warns-thousands-cloud-customers-exposed-databases-emails-2021-08-26<\/a><\/li><\/ul>\n\n\n\n<p>Also don&#8217;t miss this Youtube video by Wiz:<\/p>\n\n\n\n<figure class=\"wp-block-embed aligncenter is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n <div class=\"brlbs-cmpnt-container brlbs-cmpnt-content-blocker brlbs-cmpnt-with-individual-styles\" data-borlabs-cookie-content-blocker-id=\"default\" data-borlabs-cookie-content=\"PGRpdiBjbGFzcz0idmlkZW8tc2hvcnRjb2RlIj48aWZyYW1lIHRpdGxlPSJDaGFvc0RCIC0gQXp1cmUgQ29zbW9zIERCIFRha2VvdmVyIFZ1bG5lcmFiaWxpdHkiIHdpZHRoPSIxMTcwIiBoZWlnaHQ9IjY1OCIgc3JjPSJodHRwczovL3d3dy55b3V0dWJlLmNvbS9lbWJlZC94YUZzN3kxanlkYz9mZWF0dXJlPW9lbWJlZCIgZnJhbWVib3JkZXI9IjAiIGFsbG93PSJhY2NlbGVyb21ldGVyOyBhdXRvcGxheTsgY2xpcGJvYXJkLXdyaXRlOyBlbmNyeXB0ZWQtbWVkaWE7IGd5cm9zY29wZTsgcGljdHVyZS1pbi1waWN0dXJlOyB3ZWItc2hhcmUiIGFsbG93ZnVsbHNjcmVlbj48L2lmcmFtZT48L2Rpdj4=\"><div class=\"brlbs-cmpnt-cb-preset-a\"> <p class=\"brlbs-cmpnt-cb-description\">You are currently viewing a placeholder content from <strong>Default<\/strong>. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.<\/p> <div class=\"brlbs-cmpnt-cb-buttons\"> <a class=\"brlbs-cmpnt-cb-btn\" href=\"#\" data-borlabs-cookie-unblock role=\"button\">Unblock content<\/a> <a class=\"brlbs-cmpnt-cb-btn\" href=\"#\" data-borlabs-cookie-accept-service role=\"button\" style=\"display: none\">Accept required service and unblock content<\/a> <\/div> <a class=\"brlbs-cmpnt-cb-provider-toggle\" href=\"#\" data-borlabs-cookie-show-provider-information role=\"button\">More Information<\/a> <\/div><\/div>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Last Thursday, August 26, Microsoft informed thousands of its Azure customers about a critical vulnerability in their cloud offering Cosmos DB. Wiz, the company that found the #ChaosDB security vulnerability, was able to extract any other Cosmos DB customer&#8217;s primary key via the Jupyter Notebook integration. What happened On August 9 the research team of <a href=\"https:\/\/whiteduck.de\/en\/critical-vulnerability-in-azure-cosmos-db-act-now\/\"> <\/p>\n<div style=\"color:#ff9900\">[&#8230;]<\/div>\n<p><\/a><\/p>\n","protected":false},"author":8,"featured_media":11357,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_tribe_events_control_status":"","_tribe_events_control_status_canceled_reason":"","_tribe_events_control_status_postponed_reason":"","_tribe_events_control_online":"","_tribe_events_control_online_url":"","footnotes":""},"categories":[],"tags":[113,320,421,80,419,409,420],"class_list":["post-11347","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-azure","tag-azurecloud","tag-chaosdb","tag-cloud","tag-cosmosdb","tag-devsecops","tag-vulnerability"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Critical vulnerability in Azure Cosmos DB - Act now! - white duck<\/title>\n<meta name=\"description\" content=\"Last Thursday, August 26, Microsoft informed thousands of its Azure customers about a critical vulnerability in their cloud offering Cosmos DB. Wiz, the company that found the security vulnerability now called #ChaosDB, was able to extract any other Cosmos DB customer&#039;s primary key via the Jupyter Notebook integration.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/whiteduck.de\/en\/critical-vulnerability-in-azure-cosmos-db-act-now\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Critical vulnerability in Azure Cosmos DB - Act now! - white duck\" \/>\n<meta property=\"og:description\" content=\"Last Thursday, August 26, Microsoft informed thousands of its Azure customers about a critical vulnerability in their cloud offering Cosmos DB. Wiz, the company that found the security vulnerability now called #ChaosDB, was able to extract any other Cosmos DB customer&#039;s primary key via the Jupyter Notebook integration.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/whiteduck.de\/en\/critical-vulnerability-in-azure-cosmos-db-act-now\/\" \/>\n<meta property=\"og:site_name\" content=\"white duck\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/whiteduckgmbh\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-30T06:58:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-25T14:40:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/whiteduck.de\/wp-content\/uploads\/photo-1446776653964-20c1d3a81b06.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1951\" \/>\n\t<meta property=\"og:image:height\" content=\"1300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Nico Meisenzahl\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@whiteduck_gmbh\" \/>\n<meta name=\"twitter:site\" content=\"@whiteduck_gmbh\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nico Meisenzahl\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/whiteduck.de\\\/en\\\/critical-vulnerability-in-azure-cosmos-db-act-now\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/whiteduck.de\\\/en\\\/critical-vulnerability-in-azure-cosmos-db-act-now\\\/\"},\"author\":{\"name\":\"Nico Meisenzahl\",\"@id\":\"https:\\\/\\\/whiteduck.de\\\/en\\\/#\\\/schema\\\/person\\\/c26beb86db4a71e77e24854ed07eda69\"},\"headline\":\"Critical vulnerability in Azure Cosmos DB &#8211; Act now!\",\"datePublished\":\"2021-08-30T06:58:22+00:00\",\"dateModified\":\"2021-11-25T14:40:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/whiteduck.de\\\/en\\\/critical-vulnerability-in-azure-cosmos-db-act-now\\\/\"},\"wordCount\":783,\"image\":{\"@id\":\"https:\\\/\\\/whiteduck.de\\\/en\\\/critical-vulnerability-in-azure-cosmos-db-act-now\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/whiteduck.de\\\/wp-content\\\/uploads\\\/photo-1446776653964-20c1d3a81b06.jpeg\",\"keywords\":[\"Azure\",\"AzureCloud\",\"ChaosDB\",\"Cloud\",\"CosmosDB\",\"DevSecOps\",\"Vulnerability\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/whiteduck.de\\\/en\\\/critical-vulnerability-in-azure-cosmos-db-act-now\\\/\",\"url\":\"https:\\\/\\\/whiteduck.de\\\/en\\\/critical-vulnerability-in-azure-cosmos-db-act-now\\\/\",\"name\":\"Critical vulnerability in Azure Cosmos DB - Act now! - white duck\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/whiteduck.de\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/whiteduck.de\\\/en\\\/critical-vulnerability-in-azure-cosmos-db-act-now\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/whiteduck.de\\\/en\\\/critical-vulnerability-in-azure-cosmos-db-act-now\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/whiteduck.de\\\/wp-content\\\/uploads\\\/photo-1446776653964-20c1d3a81b06.jpeg\",\"datePublished\":\"2021-08-30T06:58:22+00:00\",\"dateModified\":\"2021-11-25T14:40:19+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/whiteduck.de\\\/en\\\/#\\\/schema\\\/person\\\/c26beb86db4a71e77e24854ed07eda69\"},\"description\":\"Last Thursday, August 26, Microsoft informed thousands of its Azure customers about a critical vulnerability in their cloud offering Cosmos DB. Wiz, the company that found the security vulnerability now called #ChaosDB, was able to extract any other Cosmos DB customer's primary key via the Jupyter Notebook integration.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/whiteduck.de\\\/en\\\/critical-vulnerability-in-azure-cosmos-db-act-now\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/whiteduck.de\\\/en\\\/critical-vulnerability-in-azure-cosmos-db-act-now\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/whiteduck.de\\\/en\\\/critical-vulnerability-in-azure-cosmos-db-act-now\\\/#primaryimage\",\"url\":\"https:\\\/\\\/whiteduck.de\\\/wp-content\\\/uploads\\\/photo-1446776653964-20c1d3a81b06.jpeg\",\"contentUrl\":\"https:\\\/\\\/whiteduck.de\\\/wp-content\\\/uploads\\\/photo-1446776653964-20c1d3a81b06.jpeg\",\"width\":1951,\"height\":1300,\"caption\":\"world map network\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/whiteduck.de\\\/en\\\/critical-vulnerability-in-azure-cosmos-db-act-now\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/whiteduck.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Critical vulnerability in Azure Cosmos DB &#8211; Act now!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/whiteduck.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/whiteduck.de\\\/en\\\/\",\"name\":\"white duck\",\"description\":\"Your Partner for Microsoft Azure &amp; AI\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/whiteduck.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/whiteduck.de\\\/en\\\/#\\\/schema\\\/person\\\/c26beb86db4a71e77e24854ed07eda69\",\"name\":\"Nico Meisenzahl\",\"description\":\"Nico Meisenzahl works as Senior Cloud &amp; DevOps Consultant at white duck. As an elected Microsoft MVP, Docker Community Leader and GitLab Hero, his current passion is for topics around Cloud-Native and Kubernetes. Nico is a frequent speaker at conferences, user group events and Meetups in Europe and the United States.\",\"sameAs\":[\"https:\\\/\\\/meisenzahl.org\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/nicomeisenzahl\\\/\"],\"url\":\"https:\\\/\\\/whiteduck.de\\\/en\\\/author\\\/nmeisenzahl\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Critical vulnerability in Azure Cosmos DB - Act now! - white duck","description":"Last Thursday, August 26, Microsoft informed thousands of its Azure customers about a critical vulnerability in their cloud offering Cosmos DB. Wiz, the company that found the security vulnerability now called #ChaosDB, was able to extract any other Cosmos DB customer's primary key via the Jupyter Notebook integration.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/whiteduck.de\/en\/critical-vulnerability-in-azure-cosmos-db-act-now\/","og_locale":"en_US","og_type":"article","og_title":"Critical vulnerability in Azure Cosmos DB - Act now! - white duck","og_description":"Last Thursday, August 26, Microsoft informed thousands of its Azure customers about a critical vulnerability in their cloud offering Cosmos DB. Wiz, the company that found the security vulnerability now called #ChaosDB, was able to extract any other Cosmos DB customer's primary key via the Jupyter Notebook integration.","og_url":"https:\/\/whiteduck.de\/en\/critical-vulnerability-in-azure-cosmos-db-act-now\/","og_site_name":"white duck","article_publisher":"https:\/\/www.facebook.com\/whiteduckgmbh","article_published_time":"2021-08-30T06:58:22+00:00","article_modified_time":"2021-11-25T14:40:19+00:00","og_image":[{"width":1951,"height":1300,"url":"https:\/\/whiteduck.de\/wp-content\/uploads\/photo-1446776653964-20c1d3a81b06.jpeg","type":"image\/jpeg"}],"author":"Nico Meisenzahl","twitter_card":"summary_large_image","twitter_creator":"@whiteduck_gmbh","twitter_site":"@whiteduck_gmbh","twitter_misc":{"Written by":"Nico Meisenzahl","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/whiteduck.de\/en\/critical-vulnerability-in-azure-cosmos-db-act-now\/#article","isPartOf":{"@id":"https:\/\/whiteduck.de\/en\/critical-vulnerability-in-azure-cosmos-db-act-now\/"},"author":{"name":"Nico Meisenzahl","@id":"https:\/\/whiteduck.de\/en\/#\/schema\/person\/c26beb86db4a71e77e24854ed07eda69"},"headline":"Critical vulnerability in Azure Cosmos DB &#8211; Act now!","datePublished":"2021-08-30T06:58:22+00:00","dateModified":"2021-11-25T14:40:19+00:00","mainEntityOfPage":{"@id":"https:\/\/whiteduck.de\/en\/critical-vulnerability-in-azure-cosmos-db-act-now\/"},"wordCount":783,"image":{"@id":"https:\/\/whiteduck.de\/en\/critical-vulnerability-in-azure-cosmos-db-act-now\/#primaryimage"},"thumbnailUrl":"https:\/\/whiteduck.de\/wp-content\/uploads\/photo-1446776653964-20c1d3a81b06.jpeg","keywords":["Azure","AzureCloud","ChaosDB","Cloud","CosmosDB","DevSecOps","Vulnerability"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/whiteduck.de\/en\/critical-vulnerability-in-azure-cosmos-db-act-now\/","url":"https:\/\/whiteduck.de\/en\/critical-vulnerability-in-azure-cosmos-db-act-now\/","name":"Critical vulnerability in Azure Cosmos DB - Act now! - white duck","isPartOf":{"@id":"https:\/\/whiteduck.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/whiteduck.de\/en\/critical-vulnerability-in-azure-cosmos-db-act-now\/#primaryimage"},"image":{"@id":"https:\/\/whiteduck.de\/en\/critical-vulnerability-in-azure-cosmos-db-act-now\/#primaryimage"},"thumbnailUrl":"https:\/\/whiteduck.de\/wp-content\/uploads\/photo-1446776653964-20c1d3a81b06.jpeg","datePublished":"2021-08-30T06:58:22+00:00","dateModified":"2021-11-25T14:40:19+00:00","author":{"@id":"https:\/\/whiteduck.de\/en\/#\/schema\/person\/c26beb86db4a71e77e24854ed07eda69"},"description":"Last Thursday, August 26, Microsoft informed thousands of its Azure customers about a critical vulnerability in their cloud offering Cosmos DB. Wiz, the company that found the security vulnerability now called #ChaosDB, was able to extract any other Cosmos DB customer's primary key via the Jupyter Notebook integration.","breadcrumb":{"@id":"https:\/\/whiteduck.de\/en\/critical-vulnerability-in-azure-cosmos-db-act-now\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/whiteduck.de\/en\/critical-vulnerability-in-azure-cosmos-db-act-now\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/whiteduck.de\/en\/critical-vulnerability-in-azure-cosmos-db-act-now\/#primaryimage","url":"https:\/\/whiteduck.de\/wp-content\/uploads\/photo-1446776653964-20c1d3a81b06.jpeg","contentUrl":"https:\/\/whiteduck.de\/wp-content\/uploads\/photo-1446776653964-20c1d3a81b06.jpeg","width":1951,"height":1300,"caption":"world map network"},{"@type":"BreadcrumbList","@id":"https:\/\/whiteduck.de\/en\/critical-vulnerability-in-azure-cosmos-db-act-now\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/whiteduck.de\/en\/"},{"@type":"ListItem","position":2,"name":"Critical vulnerability in Azure Cosmos DB &#8211; Act now!"}]},{"@type":"WebSite","@id":"https:\/\/whiteduck.de\/en\/#website","url":"https:\/\/whiteduck.de\/en\/","name":"white duck","description":"Your Partner for Microsoft Azure &amp; AI","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/whiteduck.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/whiteduck.de\/en\/#\/schema\/person\/c26beb86db4a71e77e24854ed07eda69","name":"Nico Meisenzahl","description":"Nico Meisenzahl works as Senior Cloud &amp; DevOps Consultant at white duck. As an elected Microsoft MVP, Docker Community Leader and GitLab Hero, his current passion is for topics around Cloud-Native and Kubernetes. Nico is a frequent speaker at conferences, user group events and Meetups in Europe and the United States.","sameAs":["https:\/\/meisenzahl.org","https:\/\/www.linkedin.com\/in\/nicomeisenzahl\/"],"url":"https:\/\/whiteduck.de\/en\/author\/nmeisenzahl\/"}]}},"_links":{"self":[{"href":"https:\/\/whiteduck.de\/en\/wp-json\/wp\/v2\/posts\/11347","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/whiteduck.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/whiteduck.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/whiteduck.de\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/whiteduck.de\/en\/wp-json\/wp\/v2\/comments?post=11347"}],"version-history":[{"count":0,"href":"https:\/\/whiteduck.de\/en\/wp-json\/wp\/v2\/posts\/11347\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/whiteduck.de\/en\/wp-json\/wp\/v2\/media\/11357"}],"wp:attachment":[{"href":"https:\/\/whiteduck.de\/en\/wp-json\/wp\/v2\/media?parent=11347"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/whiteduck.de\/en\/wp-json\/wp\/v2\/categories?post=11347"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/whiteduck.de\/en\/wp-json\/wp\/v2\/tags?post=11347"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}