Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data
Information
Microsoft 365 Copilot is an intelligent AI assistant powered by Generative AI, deeply integrated into the Microsoft 365, such as Word, Excel, PowerPoint, Outlook, Teams, and more. Copilot is designed to boost productivity, helping users create content, analyze data, manage communications, and collaborate more intelligently.
Incident
A critical zero-click vulnerability, EchoLeak (CVE-2025-32711), allows attackers to exfiltrate sensitive data from Microsoft 365 Copilot without user interaction, achieving a CVSS score of 9.3.
This vulnerability, discovered by Aim Security, is categorized as an LLM Scope Violation, where malicious prompts embedded in seemingly harmless content (e.g., emails) trick Copilot into accessing and processing privileged data.
The attack involves embedding a malicious payload in markdown-formatted content, which is then parsed by Copilot's RAG engine, causing it to leak sensitive information via Microsoft Teams and SharePoint URLs.
Picture 1 Overview of the attack chain
Incident
EchoLeak exploits Copilot's default behavior of combining content from various sources without isolating trust boundaries, turning automation into a silent data leak; no user clicks are required to trigger the attack.
The vulnerability leverages Copilot's internal document access privileges, allowing attackers to indirectly influence data retrieval and ranking through payload prompts in sources like emails or meeting notes; it works in both single and multi-turn conversations.
Separate vulnerabilities were also disclosed, including tool poisoning attacks affecting the Model Context Protocol (MCP), which can lead to advanced tool poisoning attacks (ATPAs) where fake error messages trick LLMs into accessing sensitive data.
Recommendation
Microsoft published an advisory stating that EchoLeak has been fully addressed on the server-side and “no customer action is required.
The important things is Security systems. We must concern and monitor as usual.
For more information please contact
Email :sales@inetms.co.th
065 149 2822 (Ms.Suphatson )
063 204 4534 (Ms.Atsamaphorn)
065 929 6330 (Ms.Kansinee)
0613879439 (Ms.Sirilak)
0922576902 (Ms.Narusorn)
Reference
Weekly Interesting CVE
Malware News or Campaign IOC/IOA | EN
No |
Campaign Name |
Detection Date |
Attack Type |
Description |
Mitigation/Remediation |
---|---|---|---|---|---|
1 |
New Mirai botnet infect TBK DVR devices via command injection flaw |
07/06/2025 |
Botnet, information-stealer |
A new strain of Mirai Malware Botnet has been found spreading on video recorder devices, including TBK DVR-4104 and DVR-4216, affecting the CVE-2024-3721 vulnerability, allowing attackers to gain access to the devices and plant the Mirai Malware. The behavior of the malware is to establish a connection to the C2 Server to register as a botnet to wait for DDoS attack commands as specified by the attacker. Researchers found that Mirai attacks were spreading to China, India, Egypt, Ukraine, Russia, Turkey and Brazil, targeting vulnerable devices. |
|
24 June 2025
Viewed 49 time