Tuesday, March 17, 2026

Critical Microsoft Update Health Tools Vulnerability Allows Remote Arbitrary Code Execution

A flaw in Microsoft’s Update Health Tools exposed Windows devices to remote code execution by exploiting abandoned Azure Blob Storage accounts.

This tool, detailed in KB4023057, helps enterprises deploy updates faster via Intune. However, it also supports trusted unverified JSON configs from hijackable storage.

Security firm Eye Security uncovered the issue after registering unused accounts, such as payloadprod0.blob.core.windows.net.​

Attack Mechanics

Update Health Tools runs uhssvc.exe from C:\Program Files\Microsoft Update Health Tools, a Microsoft-signed binary that fetches configs from predictable Azure endpoints.

In version 1.0, it queries paths like /<tenant_hash>/enrolled.json and /<tenant_hash>/Devices/<device_hash>.json to check enrollment and policies.

Attackers who claim orphaned accounts serve fake JSON with “EnterpriseActionType”: “ExecuteTool”, directing the execution of signed binaries such as explorer.exe.

The service verifies embedded Microsoft signatures but allows explorer.exe, which attackers abuse by passing parameters to launch payloads such as calc.exe.

Microsoft Update Health RCE

Version 1.1 shifts to devicelistenerprod.microsoft.com but keeps blob fallback via registry keys like UHS.ENABLEBLOBDSSCHECK=1.

Global requests hit unregistered blobs, confirming widespread exposure in Entra-joined setups.

Scale and Fixes

Eye Security logged 544,386 requests over seven days from 10 accounts, spanning 9,976 Azure tenants.

Among them, 8,536 checked enrollment, while 3,491 tenants had 40,973 devices fetch policies.

MetricCount
Total HTTP Requests544,386
Unique Tenants9,976
Enrollment Checks8,536
Policy-Fetching Devices40,973

​Researchers disclosed on July 7, 2025; Microsoft confirmed on July 17, and Microsoft took ownership of the accounts on July 18.

Update to the latest tools, turn off blob fallback, and audit external dependencies to mitigate. Windows 11 24H2 removes the tool entirely.

Varshini
Varshini
Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies..

Recent News

Recent News