Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 08 May 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:microsoft:azure_managed_instance_for_apache_cassandra:-:*:*:*:*:*:*:* |
Fri, 08 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 07 May 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper access control in Azure Managed Instance for Apache Cassandra allows an authorized attacker to execute code over a network. | |
| Title | Azure Managed Instance for Apache Cassandra Remote Code Execution Vulnerability | |
| First Time appeared |
Microsoft
Microsoft azure Managed Instance For Apache Cassandra |
|
| Weaknesses | CWE-284 | |
| CPEs | cpe:2.3:a:microsoft:azure_managed_instance_for_apache_cassandra:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Microsoft
Microsoft azure Managed Instance For Apache Cassandra |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: microsoft
Published:
Updated: 2026-05-15T17:12:01.099Z
Reserved: 2026-03-17T20:15:23.720Z
Link: CVE-2026-33109
Updated: 2026-05-08T13:07:56.759Z
Status : Analyzed
Published: 2026-05-07T22:16:34.030
Modified: 2026-05-08T19:48:54.647
Link: CVE-2026-33109
No data.
OpenCVE Enrichment
Updated: 2026-05-07T22:30:36Z