Skip to content
Breach Spot
  • The Breach News
  • Check your exposure
REPORT BREACH
Breach SpotBreach Spot
  • The Breach News
  • Check your exposure
REPORT BREACH
Breach SpotBreach Spot

Microsoft Addresses Critical Vulnerability in Copilot Studio Threatening Sensitive Data Security

  • adminadmin
  • October 6, 2024
  • vulnerabilities

Critical Vulnerability Discovered in Microsoft’s Copilot Studio

Cybersecurity experts have revealed a significant security vulnerability impacting Microsoft’s Copilot Studio, raising concerns about the potential for unauthorized access to sensitive data. The flaw, designated as CVE-2024-38206 with a CVSS score of 8.5, is classified as an information disclosure vulnerability related to a server-side request forgery (SSRF) attack.

According to Microsoft in an advisory dated August 6, 2024, the vulnerability allows authenticated attackers to circumvent SSRF protections within the application, enabling them to leak sensitive information over the network. This serious shortcoming could permit attackers to exploit the Copilot’s functionality to make external web requests, thereby gaining access to internal resources.

Evan Grant, a security researcher with Tenable, who discovered and reported the vulnerability, explained that the flaw could be leveraged to access Microsoft’s internal infrastructure responsible for Copilot Studio. This included obtaining tokens for managed identities, which can then be misused to access other internal components like the Instance Metadata Service (IMDS) and internal Cosmos DB instances. The implication of this attack technique is particularly alarming as it allows attackers to extract instance metadata embedded in calls through Copilot, thereby facilitating a path to unauthorized access.

While Microsoft has stated that the vulnerability has been addressed and that no action is required from customers, the incident highlights a critical issue: even though cross-tenant information cannot be accessed, the shared infrastructure supporting Copilot Studio may expose multiple clients to risk should an attacker gain elevated privileges within Microsoft’s internal systems.

This disclosure follows another recent report from Tenable detailing two patched vulnerabilities in Microsoft’s Azure Health Bot Service, which, if left unaddressed, could allow malicious actors to move laterally within customer environments to extract sensitive patient data. These incidents underscore an ongoing trend of vulnerabilities in major cloud services, compounding security concerns for organizations depending on these platforms.

In response to these vulnerabilities, Microsoft has announced that starting October 2024, it will mandate multi-factor authentication (MFA) for all Azure customers as part of its Secure Future Initiative. This requirement aims to enhance security by ensuring that MFA is necessary for signing into essential services, including the Azure portal and the Microsoft Entra admin center. The gradual enforcement of MFA for additional tools and services will commence in early 2025, further solidifying Microsoft’s commitment to strengthening its cybersecurity measures.

The attack described aligns with several tactics and techniques found in the MITRE ATT&CK framework, particularly under the categories of initial access and privilege escalation. The utilization of SSRF as a method to gain unauthorized access points to a sophisticated understanding of the underlying infrastructure, typical of advanced persistent threats.

For business owners invested in defending against cybersecurity incidents, the Copilot Studio vulnerability serves as a critical reminder of the importance of robust security practices and the continual need for vigilance in safeguarding sensitive information. As threats evolve, the necessity of adopting comprehensive security measures, such as enforced MFA and regular vulnerability assessments, becomes paramount in maintaining a secure operational environment.

Source link

Help Prevent Exploitation, Report Breaches

Help to prevent further data unauthorized access or potential exploitation. Protect others by sharing vital breach information. If you’ve discovered a new data breach

REPORT HERE
Trending now

"Fortinet" AI Apple artificial intelligence Artificial Intelligence & Machine Learning AT&T Change Healthcare CISA Cisco cloud security compliance CrowdStrike cryptocurrency Cybercrime cybersecurity data breach data breaches data privacy data security encryption ESET Facebook FBI Fraud Management Fraud Management & Cybercrime Generative AI Google healthcare HIPAA identity theft LockBit machine learning Malware Meta Microsoft Multi-Factor Authentication OpenAI Palo Alto Networks phishing ransomware Salt Typhoon Scattered Spider Signal T-Mobile Telegram

Sector alert bulletin

Subscribe to your sector-specific insight newsletter to stay updated on potential data breaches and ongoing cyber-attacks targeting your industry

Stay informed and prepared against emerging security threats.

SUSCRIBE NOW

Related Posts

ASUS Addresses Remote Code Execution Vulnerabilities in DriverHub Exploitable via HTTP and Custom .ini Files

  • August 30, 2025

China-Linked APTs Target 581 Critical Systems Worldwide Using SAP Vulnerability CVE-2025-31324

May 13, 2025
Vulnerability / Threat Intelligence

A newly identified critical security vulnerability in SAP NetWeaver is being exploited by several nation-state actors linked to China to infiltrate vital infrastructure networks. “Threat actors are taking advantage of CVE-2025-31324, an unauthenticated file upload vulnerability that allows for remote code execution (RCE),” stated EclecticIQ researcher Arda Büyükkaya in a recent analysis. Targets include natural gas distribution, water and waste management utilities in the UK, medical device manufacturing facilities, oil and gas companies in the U.S., and investment and financial regulation ministries in Saudi Arabia. This assessment is based on a publicly accessible directory found on compromised attacker-controlled infrastructure (15.204.56[.]106), which contained event logs detailing activities across numerous breached systems.

  • August 30, 2025

Ivanti Addresses EPMM Vulnerabilities Leading to Remote Code Execution in Select Attacks

May 14, 2025
Vulnerability / Endpoint Security

Ivanti has issued security updates to remedy two vulnerabilities in its Endpoint Manager Mobile (EPMM) software, which have been exploited in limited attacks for remote code execution. The vulnerabilities include:

  • CVE-2025-4427 (CVSS score: 5.3) – An authentication bypass that enables attackers to access protected resources without valid credentials.
  • CVE-2025-4428 (CVSS score: 7.2) – A remote code execution vulnerability allowing arbitrary code execution on affected systems.

Exploiting these vulnerabilities could allow an attacker to chain them together to execute arbitrary code on a compromised device without authentication. The affected versions of the product are:

  • 11.12.0.4 and earlier (fixed in 11.12.0.5)
  • 12.3.0.1 and earlier (fixed in 12.3.0.2)
  • 12.4.0.1 and earlier (fixed in 12.4.0.2)
  • 12.5.0.0 and earlier (fixed in 12.5.0.1)

Ivanti has credited CERT-EU for reporting these vulnerabilities.

  • August 29, 2025

Fortinet Addresses CVE-2025-32756: Critical Zero-Day RCE Vulnerability in FortiVoice Systems

May 14, 2025
Vulnerability / Network Security

Fortinet has issued a fix for a severe security vulnerability exploited as a zero-day in attacks against FortiVoice enterprise phone systems. Identified as CVE-2025-32756, this flaw has a high CVSS score of 9.6 out of 10.0. According to the company’s advisory, “A stack-based overflow vulnerability [CWE-121] in FortiVoice, FortiMail, FortiNDR, FortiRecorder, and FortiCamera may enable a remote unauthenticated attacker to execute arbitrary code or commands via specially crafted HTTP requests.” Fortinet has confirmed that the flaw has been actively exploited in the wild within FortiVoice systems, although details regarding the scope of the attacks and the identities of the attackers remain undisclosed. Notably, the attacker engaged in network scans of devices, deleted system crash logs, and enabled FCGI debugging to capture credentials from the system and SSH login attempts. The vulnerability impacts the following products and versions: FortiCamera 1.1, 2.0 (Update to a secure release recommended).

  • August 29, 2025

Real-time data breach monitoring by scanning public databases, criminal forums, and online markets to detect exposed credentials and sensitive data.

Industries
  • Enterprise Security Teams
  • Financial Services
  • Retail and E-commerce
  • Legal Services
  • Law Enforcement
Commonly Used For
  • Penetration Testing
  • M&A Risk Research
  • Vulnerability Assessment
  • Red Team Operation
  • Enterprise Security
Contact Us

Need help or have a question?

Email: [email protected]
Phone: +1 (914) 2943243

Copyright © 2025 - Breachspot, Security Breaches Spotted