Severity Framework
Snyk CCSS
Rule category
Network / Ports
Is your enviroment affected by this misconfiguration?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsFrameworks
CIS-Azure
CIS-Controls
CSA-CCM
ISO-27001
NIST-800-53
PCI-DSS
SOC-2
- Snyk ID SNYK-CC-00462
- credit Snyk Research Team
Description
Attackers could use brute force techniques to gain access to virtual machines. Once the attackers gain access, they can use a virtual machine as a launch point for compromising other machines on the virtual network or even attack networked devices outside of Azure.
How to fix?
Remove 22
, *
, or any port range that covers 22
from properties.securityRules[].properties.destinationPortRange(s)
when 'properties.securityRules[].properties.access' is set to allow
.