InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Commvault confirms that hackers misuse CVE-2025-3928 as zero day in an Azure violation
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Commvault confirms that hackers misuse CVE-2025-3928 as zero day in an Azure violation
Technology

Commvault confirms that hackers misuse CVE-2025-3928 as zero day in an Azure violation

May 1, 2025 2 Min Read
Share
Zero-Day in Azure Breach
SHARE

By leveraging CVE-2025-3928, the enterprise data backup platform Commvault revealed that an unknown nation-state threat actor violated the Microsoft Azure environment, but emphasized that there was no evidence of unauthorized data access.

“This activity has impacted a small number of customers that we share with Microsoft, and we work with these customers to provide support,” the company said in the update.

“The important thing is that there is no unauthorized access to customer backup data that protects and protects Commvault, and does not have a significant impact on our business operations and our ability to provide products and services.”

In a recommendation issued on March 7, 2025, Commvault said that on February 20, Microsoft was notified of unauthorized activity within an Azure environment, and that threat actors used CVE-2025-3928 as a zero day. He also said it had rotated the affected credentials to enhance security measures.

This disclosure requires that the US Cybersecurity and Infrastructure Security Agency (CISA) add CVE-2025-3928 to its known Exploitation Vulnerabilities (KEV) catalog and apply the necessary patches to the Commvault web server by May 19, 2025, as it requires a Federal Private Enforcement Division (FCEB) agency.

To mitigate the risk posed by such attacks, customers are advised to apply conditional access policies to all Microsoft 365, Dynamics 365, Azure AD single tenant app registrations, and rotate and sync client secrets every 90 days between the Azure portal and Commvault.

The company also encourages users to monitor sign-in activity and detect attempts to access from IP addresses other than Alloplisted Range. The following IP addresses are associated with malicious activity –

  • 108.69.148.100
  • 128.92.80.210
  • 184.153.42.129
  • 108.6.189.53, and
  • 159.242.42.20
See also  Looking for "Owls and Lizards" in advertisers

“These IP addresses are explicitly blocked within conditional access policies and must be monitored by Azure sign-in logs,” Commvault said. “If any attempts to access from these IPS are detected, please report the incident immediately to Commvault Support for further analysis and action.”

Share This Article
Twitter Copy Link
Previous Article Best PC Case 2025 Best PC Case 2025
Next Article mm CNTXT AI launches Munsit: the most accurate Arabic speech recognition system ever built

Latest News

mm

AI is giving pets a voice: The future of cat health care begins with one photo

Artificial intelligence is revolutionizing the way we care for animals.…

May 15, 2025
5 BCDR Essentials for Effective Ransom Defense

5 BCDR Essentials for Effective Ransom Defense

Ransomware has evolved into a deceptive, highly tuned, dangerous and…

May 15, 2025
mm

Anaconda launches the first unified AI platform to redefine enterprise-grade AI development

Anaconda Inc., a longtime leader in Python-based data science, has…

May 14, 2025
Microsoft fixed 78 flaws and exploited five zero-days. CVSS 10 bug affects Azure DevOps servers

Microsoft fixed 78 flaws and exploited five zero-days. CVSS 10 bug affects Azure DevOps servers

On Tuesday, Microsoft shipped fixes to address a total of…

May 14, 2025
mm

Why language models are “lost” in conversation

A new paper from Microsoft Research and Salesforce found that…

May 13, 2025

You Might Also Like

Critical RCE Vulnerability
Technology

Gladinet’s Triofox and Centrestack under aggressive exploitation through critical RCE vulnerabilities

2 Min Read
Fake Patch Phishing Campaigns Expanding WooCommerce User Site Backdoors Targeted
Technology

Fake Patch Phishing Campaigns Expanding WooCommerce User Site Backdoors Targeted

3 Min Read
mm
Technology

Recover and edit human images with AI

15 Min Read
mm
Technology

DeepSeek-Grm: revolutionizes scalable, cost-effective AI for businesses

9 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?