Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 08 May 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 08 May 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:microsoft:azure_managed_instance_for_apache_cassandra:-:*:*:*:*:*:*:* |
Thu, 07 May 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper input validation in Azure Managed Instance for Apache Cassandra allows an authorized attacker to execute code over a network. | |
| Title | Azure Managed Instance for Apache Cassandra Remote Code Execution Vulnerability | |
| First Time appeared |
Microsoft
Microsoft azure Managed Instance For Apache Cassandra |
|
| Weaknesses | CWE-20 | |
| CPEs | cpe:2.3:a:microsoft:azure_managed_instance_for_apache_cassandra:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Microsoft
Microsoft azure Managed Instance For Apache Cassandra |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: microsoft
Published:
Updated: 2026-05-15T17:13:39.679Z
Reserved: 2026-03-24T00:52:01.354Z
Link: CVE-2026-33844
Updated: 2026-05-08T14:37:12.299Z
Status : Analyzed
Published: 2026-05-07T22:16:34.420
Modified: 2026-05-08T19:48:15.363
Link: CVE-2026-33844
No data.
OpenCVE Enrichment
Updated: 2026-05-07T23:30:40Z