0.4 C
New York
Friday, December 6, 2024

Microsoft Patches Vital Copilot Studio Vulnerability Exposing Delicate Knowledge


Aug 21, 2024Ravie LakshmananSoftware program Safety / Vulnerability

Microsoft Patches Vital Copilot Studio Vulnerability Exposing Delicate Knowledge

Cybersecurity researchers have disclosed a important safety flaw impacting Microsoft’s Copilot Studio that might be exploited to entry delicate info.

Tracked as CVE-2024-38206 (CVSS rating: 8.5), the vulnerability has been described as an info disclosure bug stemming from a server-side request forgery (SSRF) assault.

“An authenticated attacker can bypass Server-Facet Request Forgery (SSRF) safety in Microsoft Copilot Studio to leak delicate info over a community,” Microsoft mentioned in an advisory launched on August 6, 2024.

Cybersecurity

The tech large additional mentioned the vulnerability has been addressed and that it requires no buyer motion.

Tenable safety researcher Evan Grant, who’s credited with discovering and reporting the shortcoming, mentioned it takes benefit of Copilot’s capability to make exterior net requests.

“Mixed with a helpful SSRF safety bypass, we used this flaw to get entry to Microsoft’s inner infrastructure for Copilot Studio, together with the Occasion Metadata Service (IMDS) and inner Cosmos DB cases,” Grant mentioned.

Copilot Studio Vulnerability

Put in a different way, the assault method made it attainable to retrieve the occasion metadata in a Copilot chat message, utilizing it to acquire managed identification entry tokens, which may then be abused to entry different inner assets, together with gaining learn/write entry to a Cosmos DB occasion.

The cybersecurity firm additional famous that whereas the strategy doesn’t enable entry to cross-tenant info, the infrastructure powering the Copilot Studio service is shared amongst tenants, probably affecting a number of clients when having elevated entry to Microsoft’s inner infrastructure.

The disclosure comes as Tenable detailed two now-patched safety flaws in Microsoft’s Azure Well being Bot Service (CVE-2024-38109, CVSS rating: 9.1), that, if exploited, may allow a malicious actor to realize lateral motion inside buyer environments and entry delicate affected person knowledge.

Cybersecurity

It additionally follows an announcement from Microsoft that it’ll require all Microsoft Azure clients to have enabled multi-factor authentication (MFA) on their accounts beginning October 2024 as a part of its Safe Future Initiative (SFI).

“MFA will probably be required to sign-in to Azure portal, Microsoft Entra admin heart, and Intune admin heart. The enforcement will progressively roll out to all tenants worldwide,” Redmond mentioned.

“Starting in early 2025, gradual enforcement for MFA at sign-in for Azure CLI, Azure PowerShell, Azure cell app, and Infrastructure as Code (IaC) instruments will start.”

Discovered this text attention-grabbing? Observe us on Twitter and LinkedIn to learn extra unique content material we publish.



Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles