Improper verification of cryptographic signature in Microsoft Azure Functions allows an authorized attacker to execute code over a network.
Weakness
The product does not verify, or incorrectly verifies, the cryptographic signature for data.
References