Skip to content
OnMSFT.com
  • Home
  • About
  • Contact
  • News
  • How-to
  • Feature stories
  • Deals
  • Microsoft / office 365
  • Reviews
Menu
  • Home
  • About
  • Contact
  • News
  • How-to
  • Feature stories
  • Deals
  • Microsoft / office 365
  • Reviews
  1. Home
  2. News
  3. Critical security vulnerability discovered in Microsoft Teams, posing malware distribution risk

Critical security vulnerability discovered in Microsoft Teams, posing malware distribution risk

Pranav Bhardwaj Pranav Bhardwaj
June 26, 2023
2 min read

In a concerning revelation, security researchers have unearthed a security vulnerability in the latest version of Microsoft Teams that leaves the platform susceptible to malware distribution. The vulnerability, known as IDOR (Insecure Direct Object Reference), allows malicious files to be delivered from external sources, posing a significant risk to organizations relying on Microsoft Teams for day-to-day operations.

JUMPSEC Labs recently issued an advisory highlighting the discovery made by researchers Max Corbridge and Tom Ellson. They identified a flaw in the default configuration of the latest version of Microsoft Teams, which enabled bypassing of client-side security controls. Exploiting this flaw, an attacker could deliver malware by crafting malicious files and tricking users into accepting them from external tenants.

Although Microsoft Teams typically displays a warning banner for incoming messages from external senders, users often overlook these alerts and proceed to interact with the messages. Exploiting this tendency, attackers can successfully launch malware attacks against target systems. Microsoft Teams aims to mitigate such threats by imposing restrictions on file delivery from external tenants through client-side controls. However, the researchers managed to bypass these security measures using a traditional IDOR technique.

By manipulating the recipient ID in the POST request, specifically at /v1/users/ME/conversations//messages, the researchers were able to make malware hosted on a SharePoint domain appear as a downloadable file to the victim user instead of a suspicious link. This technique effectively evades most anti-phishing measures and poses a significant danger to organizations, as potential attackers could abuse Microsoft Teams to target their networks.

The researchers promptly reported the vulnerability to Microsoft, who acknowledged its legitimacy. However, Microsoft has not deemed the issue critical enough to warrant immediate remediation. As a result, the vulnerability remains unresolved, placing organizations at risk.

Given the ongoing threat, the researchers advise Microsoft Teams users to exercise caution when interacting with emails from external tenants. It is recommended to review external tenant permissions, implement allow-lists for trusted external tenants, and provide staff with training to identify and respond to such threats effectively.

Via: Latest Hacking News

Related

Share this article:
Previous Article Here are the devices Apple is reportedly looking to launch by 2024 Next Article Barbie content comes to Forza Horizon 5 just in time for the new Barbie movie

Related Articles

Chrome tests Google Drive file uploads in the AI Mode compose box

April 14, 2026
Gemini image creation using right click desktop Chrome

Chrome lets you remake images with Gemini on desktop using just a right-click

April 13, 2026
Samsung Display crosses 5 million QD-OLED monitor shipments as demand grows fast, with new panels and strong premium market expansion worldwide.

Samsung Display Ships 5 Million QD-OLED Monitor Panels in Four Years

April 9, 2026

Leave a Comment Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Chrome tests Google Drive file uploads in the AI Mode compose box
  • Chrome lets you remake images with Gemini on desktop using just a right-click
  • Samsung Display Ships 5 Million QD-OLED Monitor Panels in Four Years
  • Intel Arc Pro B70 Teardown Reveals Blower Cooler and Early Board Design Details
  • Users Modify RTX 5090 Lightning Z Hardware to Unlock MSI’s Restricted 2500W BIOS

Recent Comments

  1. XxRIVTYxX on Intel Says It Tried to Help Before Crimson Desert Dropped Arc Support
  2. Gaurav Kumar on Chrome Prepares Nudge to ‘Move Tabs to the Side’ as Vertical Tabs Near Release
OnMSFT.com

The Tech News Site

Categories

  • Windows
  • Surface
  • Xbox
  • How-To
  • OnPodcast
  • Gaming
  • Edge
  • Teams

Recent Posts

  • Chrome tests Google Drive file uploads in the AI Mode compose box
  • Chrome lets you remake images with Gemini on desktop using just a right-click
  • Samsung Display Ships 5 Million QD-OLED Monitor Panels in Four Years
  • Intel Arc Pro B70 Teardown Reveals Blower Cooler and Early Board Design Details
  • Users Modify RTX 5090 Lightning Z Hardware to Unlock MSI’s Restricted 2500W BIOS

Quick Links

  • About OnMSFT.com
  • Contact OnMSFT
  • Join Our Team
  • Privacy Policy
© 2010–2026 OnMSFT.com LLC. All rights reserved.
About OnMSFT.comContact OnMSFTPrivacy Policy