A cloud computing platform and infrastructure for building, deploying and managing applications and services through a worldwide network of Microsoft-managed datacenters.
Hello Liaqat Ali,
Thank you for reaching out to the Microsoft Q&A forum.
When investigated we see that this is a known side-effect of how the Windows Azure Monitor Agent (azuremonitorwindowsagent) currently bundles OpenSSL 3.x, and Defender is surface-scanning those DLLs (libcrypto-3-x64.dll and libssl-3-x64.dll) against CVEs CVE-2025-9230/9231/9232. Here’s what you can do today and what to expect going forward:
- Why you’re still seeing it – The 1.42.0.0 version of the Azure Monitor Agent for Windows ships with OpenSSL 3.0.13, which contains the CVEs you’re seeing. – The engineering team has already fixed these vulnerabilities in the next Windows extension release (planned in an upcoming 1.4x build), but that update hasn’t gone live yet.
- Short-term mitigation in Defender Until the patched agent version is generally available, you can suppress/accept these findings in Defender for Cloud (or Defender for Endpoint vulnerability management) so they don’t continue to show up as open risks:
In Defender for Cloud
Go to Security → Environment settings → your subscription → Vulnerability exceptions.
Click “Add exception” and enter:
- CVE IDs: CVE-2025-9230, CVE-2025-9231, CVE-2025-9232
- File path pattern:
c:\packages\plugins\microsoft.azure.monitor.azuremonitorwindowsagent\1.42.0.0*\libcrypto-3-x64.dll c:\packages\plugins\microsoft.azure.monitor.azuremonitorwindowsagent\1.42.0.0*\libssl-3-x64.dll - Save the exception; Defender will stop flagging those files.
On-host Defender Exclusions (if you’re only using Defender for Endpoint or local Windows Defender) From an elevated PowerShell session on each VM, run:
# Exclude the two OpenSSL DLLs
Set-MpPreference -ExclusionPath "C:\packages\plugins\microsoft.azure.monitor.azuremonitorwindowsagent\1.42.0.0\monitoring\agent\extensions\metricsextension\libcrypto-3-x64.dll"
Set-MpPreference -ExclusionPath "C:\packages\plugins\microsoft.azure.monitor.azuremonitorwindowsagent\1.42.0.0\monitoring\agent\extensions\metricsextension\libssl-3-x64.dll"
- Long-term remediation Watch the Agent release notes for the “next Windows extension, v1.4x” where the OpenSSL libraries will be upgraded to a CVE-free version. As soon as that extension version is published, simply update your Azure Monitor Agent to eliminate the findings entirely.
Let me know if any further queries - feel free to reach out.
References
- Vulnerable version of OpenSSL on Azure Monitor extension https://supportability.visualstudio.com/AzureMonitor/_wiki/wikis/AzureMonitor.wiki/2601130050003562
- OpenSSL vulnerability in Azure Agent (fix planned in 1.42) https://supportability.visualstudio.com/AzureMonitor/_wiki/wikis/AzureMonitor.wiki/2603250010002053
- Defender for Cloud – Servers Vulnerability Assessment https://learn.microsoft.com/azure/defender-for-cloud/deploy-vulnerability-assessment-tvm
- Azure Connected Machine Agent release notes (to track future OpenSSL fixes) https://learn.microsoft.com/azure/azure-arc/servers/agent-release-notes-archive#version-143---june-2024