CVE-2026-32213
Published: 03 April 2026
Summary
CVE-2026-32213 is a critical-severity Improper Authorization (CWE-285) vulnerability in Microsoft Azure Ai Foundry. Its CVSS base score is 10.0 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 19.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
This vulnerability is AI-related — categorised as Other AI Platforms.
The strongest mitigations our analysis identified are NIST 800-53 AC-24 (Access Control Decisions) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations for access to system resources, directly preventing exploitation of improper authorization leading to privilege escalation.
Employs least privilege to restrict unauthorized attackers from elevating to high-level access even if authorization checks fail.
Requires correct access control decisions for resources by defined roles, mitigating incorrect authorization vulnerabilities like CWE-285 and CWE-863.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Improper authorization in public-facing Azure AI Foundry enables unauthenticated remote attackers to escalate privileges (T1068 Exploitation for Privilege Escalation via T1190 Exploit Public-Facing Application).
NVD Description
Improper authorization in Azure AI Foundry allows an unauthorized attacker to elevate privileges over a network.
Deeper analysisAI
CVE-2026-32213 is an improper authorization vulnerability affecting Azure AI Foundry, as documented with CWEs-285 (Improper Authorization) and CWE-863 (Incorrect Authorization). Published on 2026-04-03, it enables an unauthorized attacker to elevate privileges over a network. The issue carries a critical CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H), highlighting its severe potential impact.
The vulnerability can be exploited by any unauthenticated attacker with network access to the affected Azure AI Foundry instance, requiring low complexity and no user interaction. Successful exploitation allows privilege escalation, granting the attacker high-level access that compromises confidentiality, integrity, and availability across a changed scope.
Microsoft's Security Response Center advisory at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32213 details recommended mitigations and available patches for addressing this vulnerability.
Details
- CWE(s)
Affected Products
AI Security AnalysisAI
- AI Category
- Other AI Platforms
- Risk Domain
- N/A
- OWASP Top 10 for LLMs 2025
- None mapped
- Classification Reason
- Matched keywords: ai