Azure Port Ranges Used
Description
Detects Azure Network Security Groups (NSGs) that use port ranges in their security rules instead of specific ports. Using port ranges can create overly permissive network access controls that may expose services to unauthorized access and increase the attack surface.
Detection Strategy
• Scans all Network Security Group rules in the Azure subscription
• Reports a vulnerability when a security rule uses destination_port_ranges or destination_port_range with multiple ports
• Examines both the destination_port_ranges array and destination_port_range string fields in NSG rules
Severity v4.0
1.3
Low
Method ID
CSPM-1GUTN
Technique
CSPM
Target
AZURE
Technology
NETWORK_SECURITY_GROUP
CWE ID(s)
CWE-1327Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan.If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.