Azure DevOps leaks credentials (CVE-2026-42826)
CVE-2026-42826
CVE-2026-42826: Critical info disclosure in Azure DevOps lets unauthenticated attackers steal secrets over the network (CVSS 10.0). Apply Microsoft's security update immediately.
Patch now - CVE-2026-42826 is a critical information disclosure vulnerability in Azure DevOps that lets an unauthenticated attacker steal sensitive data over the network. Microsoft released a fix; apply the security update immediately.
Overview
CVE-2026-42826 carries the maximum CVSS score of 10.0 because it requires no authentication, no user interaction, and can be triggered over the network with low complexity. An attacker who sends a specially crafted request to an Azure DevOps instance can access confidential information that was intended to be protected - including credentials, access tokens, source code, or other secrets stored in the DevOps pipeline.
Affected Azure DevOps versions have been identified as vulnerable, and Microsoft has released a security update. Since the vulnerability can be exploited remotely without any user action, every exposed Azure DevOps server should be treated as at immediate risk.
Impact Assessment
The impact of CVE-2026-42826 is severe because Azure DevOps often holds the keys to an organization’s entire software development lifecycle. An attacker who extracts credentials from DevOps can pivot to code repositories, CI/CD pipelines, cloud deployments, and production services. The confidentiality of intellectual property, deployment secrets, and infrastructure access tokens is directly compromised.
Remediation Guidance
Microsoft has released a security update addressing CVE-2026-42826. All Azure DevOps customers should:
- Apply the latest security update immediately from the Azure DevOps portal or update the on-premises installation.
- After patching, rotate all secrets, tokens, and credentials stored in Azure DevOps - the attacker may have already exfiltrated this data.
- Review access logs for unusual authentication or data access patterns between the vulnerability disclosure date and patch application.
For more details, see Microsoft’s security advisory at the official Azure DevOps update page.
Security Insight
CVE-2026-42826 underscores a recurring pattern in SaaS development platforms: the systems that manage secrets are often the weakest link. This vulnerability exists not in the application code but in the platform that securely stores and manages access tokens - a design that creates a single point of failure for all downstream systems. As DevOps platforms consolidate more secrets and credentials, their attack surface grows; this advisory should prompt organizations to adopt short-lived tokens and secret rotation policies even beyond the immediate patch cycle.
Further Reading
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. From versions 3.2.0 to before 3.2.11 and 3.3.0 to before 3.3.9, there is a missing authorization and data-masking gap in Argo ...
Exposure of sensitive information to an unauthorized actor in Azure IOT Central allows an authorized attacker to elevate privileges over a network....
EverShop is a TypeScript-first eCommerce platform. Versions prior to 2.1.1 have a vulnerability in the "Forgot Password" functionality. When specifying a target email address, the API response returns...
Known is a social publishing platform. Prior to 1.6.3, a Critical Broken Authentication vulnerability exists in Known 1.6.2 and earlier. The application leaks the password reset token within a hidden ...