Azure CycleCloud Remote Code Execution Vulnerability
Azure CycleCloud Remote Code Execution Vulnerability
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Azure CycleCloud 8.2.0 | 8.2.0 |
| Microsoft | Azure CycleCloud 8.0.0 | 8.0.0 |
| Microsoft | Azure CycleCloud 8.6.0 | 8.6.0 |
| Microsoft | Azure CycleCloud 8.0.1 | 8.0.0 |
| Microsoft | Azure CycleCloud 8.0.2 | 8.0.0 |
| Microsoft | Azure CycleCloud 8.1.0 | 8.1.0 |
| Microsoft | Azure CycleCloud 8.1.1 | 8.1.0 |
| Microsoft | Azure CycleCloud 8.2.2 | 8.2.0 |
| Microsoft | Azure CycleCloud 8.2.1 | 8.2.0 |
| Microsoft | Azure CycleCloud 8.3.0 | 8.3.0 |
| Microsoft | Azure CycleCloud 8.4.0 | 8.4.0 |
| Microsoft | Azure CycleCloud 8.4.1 | 8.4.0 |
| Microsoft | Azure CycleCloud 8.4.2 | 8.4.0 |
| Microsoft | Azure CycleCloud 8.5.0 | 8.5.0 |
| Microsoft | Azure CycleCloud | 8.6.0 |
Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.
For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:
No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.