Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
This article lists new features and feature enhancements in the firmware analysis service. Get notified about when to revisit this page for updates by copying and pasting this URL into your RSS feed reader:
https://learn.microsoft.com/api/search/rss?search=%22What%27s+new+in+firmware+analysis%22&locale=en-us
April 2026
Azure Device Registry integration (Preview)
Firmware analysis now integrates with Azure Device Registry to associate firmware analysis results with Azure Device Registry-managed Devices and Assets using shared metadata.
This integration enables you to identify Azure Device Registry-managed Devices and Assets affected by critical firmware vulnerabilities and prioritize remediation across your fleet. To learn more, visit Firmware analysis integration with Azure Device Registry.
This association is based on matching the following metadata fields between uploaded firmware images and Azure Device Registry resources within the same subscription:
Firmware analysis metadata Corresponding ADR resource metadata Vendor Manufacturer Model Model Version Operating system version (Devices) or Software revision (Assets) When metadata values match, firmware analysis associates Azure Device Registry Devices and Assets with the firmware image.
Associated ADR device and asset information is surfaced in the firmware image list view, firmware overview panel, and analysis results experience.
Current limitations (Preview):
- Displays Azure Device Registry device and asset counts associated with firmware images
- Metadata updates for Azure Device Registry resources might take several minutes to appear in firmware analysis
- Navigation is provided to individual ADR resources
March 2026
Expanded Weakness (CVE) fields (Preview)
Firmware analysis now enriches CVE results with more properties to help prioritize remediation and triage vulnerabilities more effectively. These new properties are currently provided in Preview.
Note
The following new CVE fields are only shown for newly uploaded images.
New CVE enrichment fields include:
In results grid view: CISA KEV, EPSS score (percentage), and Fixed in versions. These attributes are filterable.
- CISA Known Exploited Vulnerabilities (KEV) – indicates CVEs that are known to be actively exploited in real-world attacks.
- Exploit Prediction Scoring System (EPSS) Score (percentage) – provides an estimated likelihood of exploitation.
- Fixed in versions – firmware or component versions in which a given CVE is known to be patched.
In details pane, Overview subtab:
Exploit maturity – describes the availability of exploit techniques or code when such data is available.
Note
Exploit maturity is often unavailable unless CVSS v4 data exists. When present, this field is shown in the CVE details pane, rather than the main results grid.
CISA KEV, EPSS score (percentage), EPSS percentile, Fixed in versions.
In details pane, Additional details subtab:
- CVSS vector – Displays the full CVSS metric string that represents how the CVSS severity score is calculated, providing customers with a machine‑readable view of the vulnerability’s exploitability characteristics (for example, attack vector, complexity, privileges required). This provides an understanding of why a CVE has its assigned severity.
- CWE – Shows the Common Weakness Enumeration classification for the vulnerability, including its weakness ID and category. CWE identifies the underlying root‑cause pattern, which provides valuable information when prioritizing issues by understanding the fundamental flaw behind each CVE.
Updated CVE database: Firmware analysis's CVE database was refreshed on March 20, 2026 to incorporate newer CVE data.
To learn how to interpret these fields together, see Understanding weaknesses data.
Performance improvements for large result sets
Firmware analysis now uses server-side pagination for large results sets, significantly improving load performance.
- Up to 90% reduction in load time for large result sets
- Paging remains supported using next and previous navigation
- When filters are applied, the total result count might be unavailable and therefore not displayed
- The page jump selector is no longer available when filtering is applied
- Multiselect dropdown filtering now requires values to be entered manually
UEFI analysis updates (Preview)
The following UEFI related analysis results are available in Preview and might have limited coverage:
- SBOM: detection of OpenSSL component, version detection, and CVE association when version is detected
- CVE Weaknesses: derived from detected SBOM components
- Binary hardening: detection of NX/DEP supported for UEFI firmware. You may see other results from non-UEFI executables if they are intermixed with the UEFI image in the binary.
- Extractor paths for UEFI firmware now include the UEFI module name, in addition to GUID based identifiers, to improve clarity when reviewing results.
For more information on UEFI firmware analysis support, see UEFI firmware analysis capabilities.
Note
Use the 2025-12-01-preview REST API to retrieve enhanced CVE metadata.
January 2026
- Fixed hostapd version detection: Fixed component version detection for hostapd, ensuring vulnerabilities are accurately identified and reported.
- Fixed CVSS localization issues in CVE details: Resolved an issue where some titles in the CVE detail panel were displaying placeholder strings instead of the correct localized text.
November 2025
- Download firmware analysis results as ZIP: You can now download a ZIP file of firmware analysis results, making it easy to share findings with suppliers and partners.
- Select which types of results to include in the ZIP.
- Download directly from the firmware analysis results page, or select multiple images from the workspace to download a combined set of results.
October 27, 2025
Page size picker: Added the ability for users to change the number of analysis results displayed per page, providing more flexibility when reviewing large sets of findings.
CSV filenames: Updated the naming convention for CSV downloads. Filenames now include Vendor / Model / Version of the firmware for easier identification and organization.
CVE support: Expanded support for newly disclosed CVEs across multiple libraries, including Apache, OpenSSL, Nginx, Samba, and others. This ensures broader coverage and improved vulnerability detection.
Cramfs extraction fix: Resolved issues with Cramfs filesystem extraction, improving reliability and accuracy of analysis results.
jQuery detection improvement: Enhanced identification of the jQuery library in firmware components, improving accuracy in component analysis.
October 7, 2025
Firmware analysis is now GA: We're happy to announce GA with this release.
Free workspace banner: A new banner in the portal clearly shows when you’re using a free workspace and provides a link to learn more about limits and licensing.
New built-in roles: Two new roles - Firmware Analysis User and Firmware Analysis Reader - make it easier to manage access with Azure RBAC.
Updated GA SDKs and CLI: The Azure CLI, PowerShell module, and SDKs for firmware analysis are updated and are GA. Quickstarts and samples now reflect the latest commands and parameters.
Terraform and Bicep support: New Quickstarts are available for deploying firmware analysis workspaces using Terraform and Bicep templates.
Improved OpenSSL detection: Enhancements to OpenSSL version identification improve accuracy and reduce false negatives in analysis results.
JFFS2 extraction fix: Resolved issues with JFFS2 filesystem extraction for more reliable analysis results.
Linux kernel version fix: Improved parsing of Linux kernel version strings for better vulnerability matching.
Other fixes: Includes general quality and reliability improvements.
June 2025
Standalone and embedded experiences: Firmware analysis now exists as a standalone service in Azure and continues to exist as a blade within Defender for IoT. You can easily reach firmware analysis by searching for "firmware analysis" in the Azure portal search bar.
Free SKU for Public Preview: Firmware analysis is now in Public Preview as a standalone offering. While in Public Preview, all features and functionality are free of charge, and we look forward to gathering your feedback. In GA, we'll provide more details on capacity limits and licensing.
Faster analysis: Firmware analysis service now can extract, analyze, and produce results up to 30% faster. This improvement means that the time it takes from when you upload your firmware image to when the image is in the Ready state to review results is reduced by up to 30%.
New UI with multiple workspaces per resource group: You can now create and manage multiple workspaces for resource groups, which helps you organize your firmware images better.
Support for <1GB pre-extraction and <70GB fully extracted: You can analyze images up to 1GB before it iss extracted, and up to 70GB fully extracted. The analysis won't complete if the expanded image is greater than 70GB.
Azure Monitor tab in firmware analysis: For each of your workspaces, you can now use Azure Monitor to track the latency of firmware analysis (how long the analysis took) and any failures or errors that occurred during analysis. To access Azure Monitor for firmware analysis, search for "firmware analysis workspaces" in the Azure portal search bar, then navigate to your workspace, and expand the "Monitoring" tab to access "Metrics." With Azure Monitor, you can visualize your data with graphs, scatter plots, histograms, and more.
October 2024
Support for UEFI images: Firmware analysis service now analyzes UEFI images and identifies PKFail instances.
New upload form with drag and drop: You can now upload files with the new drag and drop functionality.
Enhanced navigation menu: Firmware analysis service in the Azure portal now has a menu blade for improved navigation.
Race condition resolution: Resolved a race condition that occasionally prevented the UI from fully populating the firmware list on initial load.
Certificate encoding update: Deprecated the encoding value for certificates to avoid confusion. Now also reporting DER certificates in embedded binaries and flat files.
Paged analysis results: Added support to fetch analysis results in pages to ensure safe retrieval of large data sets.
Additional bug fixes and improvements: Multiple bug fixes for filters, styling, and accessibility.
March 2024
Azure CLI and PowerShell commands: Automate your workflow of analyzing firmware images by using the Firmware analysis Azure CLI or the Firmware analysis PowerShell commands.
User choice in resource group: Pick your own resource group or create a new resource group during the onboarding process.
New UI format with Firmware inventory: Subtabs to organize Getting started, Subscription management, and Firmware inventory.
Enhanced documentation: Updates to Tutorial: Analyze an IoT/OT firmware image documentation addressing the new onboarding experience.
January 2024
PDF report generator: Addition of a Download as PDF capability on the Overview page that generates and downloads a PDF report of the firmware analysis results.
Reduced analysis time: Analysis time is shorter by 30-80%, depending on image size.
CODESYS libraries detection: Firmware analysis now detects the use of CODESYS libraries, which Microsoft recently identified as having high-severity vulnerabilities. These vulnerabilities can be exploited for attacks such as remote code execution (RCE) or denial of service (DoS). For more information, see Multiple high severity vulnerabilities in CODESYS V3 SDK could lead to RCE or DoS.
Enhanced documentation: Addition of documentation addressing the following concepts:
- Azure role-based access control for firmware analysis, which explains roles and permissions needed to upload firmware images and share analysis results, and an explanation of how the FirmwareAnalysisRG resource group works
- Frequently asked questions
Improved filtering for each report: Each subtab report now includes more fine-grained filtering capabilities.
Firmware metadata: Addition of a collapsible tab with firmware metadata that's available on each page.
Improved version detection: Improved version detection of the following libraries:
- pcre
- pcre2
- net-tools
- zebra
- dropbear
- bluetoothd
- WolfSSL
- sqlite3
Added support for file systems: Firmware analysis now supports extraction of the following file systems. For more information, see Firmware analysis FAQs:
- ISO
- RomFS
- Zstandard and nonstandard LZMA implementations of SquashFS
July 2023
Microsoft Defender for IoT firmware analysis is now available in public preview. Defender for IoT can analyze your device firmware for common weaknesses and vulnerabilities, and provide insight into your firmware security. This analysis is useful whether you build the firmware in-house or receive firmware from your supply chain.
For more information, see Firmware analysis for device builders.