Azure IoT Explorer
by Microsoft
CVEs (5)
| CVE | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-23661 | 0.00 | — | 0.00 | Mar 10, 2026 | Cleartext transmission of sensitive information in Azure IoT Explorer allows an unauthorized attacker to disclose information over a network. | ||
| CVE-2026-26121 | 0.00 | — | 0.00 | Mar 10, 2026 | Server-side request forgery (ssrf) in Azure IoT Explorer allows an unauthorized attacker to perform spoofing over a network. | ||
| CVE-2026-23664 | 0.00 | — | 0.00 | Mar 10, 2026 | Improper restriction of communication channel to intended endpoints in Azure IoT Explorer allows an unauthorized attacker to disclose information over a network. | ||
| CVE-2026-21528 | 0.00 | — | 0.00 | Feb 10, 2026 | Binding to an unrestricted ip address in Azure IoT Explorer allows an unauthorized attacker to disclose information over a network. | ||
| CVE-2026-21524 | 0.00 | — | 0.00 | Jan 22, 2026 | Exposure of sensitive information to an unauthorized actor in Azure Data Explorer allows an unauthorized attacker to disclose information over a network. |
- CVE-2026-23661Mar 10, 2026risk 0.00cvss —epss 0.00
Cleartext transmission of sensitive information in Azure IoT Explorer allows an unauthorized attacker to disclose information over a network.
- CVE-2026-26121Mar 10, 2026risk 0.00cvss —epss 0.00
Server-side request forgery (ssrf) in Azure IoT Explorer allows an unauthorized attacker to perform spoofing over a network.
- CVE-2026-23664Mar 10, 2026risk 0.00cvss —epss 0.00
Improper restriction of communication channel to intended endpoints in Azure IoT Explorer allows an unauthorized attacker to disclose information over a network.
- CVE-2026-21528Feb 10, 2026risk 0.00cvss —epss 0.00
Binding to an unrestricted ip address in Azure IoT Explorer allows an unauthorized attacker to disclose information over a network.
- CVE-2026-21524Jan 22, 2026risk 0.00cvss —epss 0.00
Exposure of sensitive information to an unauthorized actor in Azure Data Explorer allows an unauthorized attacker to disclose information over a network.