A new vulnerability was found in Microsoft Endpoints by researchers at SOCRadar Labs. They notified the organization of the flaw that could allow unauthorized access to transactional business data related to exchanges between Microsoft and other clients.
On September 24, 2022, the researchers informed the tech giant about the vulnerability, which was immediately addressed and is now reachable with the necessary credentials. Since the vulnerability was detected earlier and stopped before it could be exploited, no evidence of a compromised customer account or systems has been found.
Microsoft Endpoint vulnerability: How does it affect the customers?
Business transaction data includes confidential information between two parties involved in a business. It contains names, email addresses, the content of the email, the company’s legal terms, the phone number associated with the parties to the transaction, files, bills, and other important documents shared between the customer and the Microsoft partner.
According to the security researchers, the problem wasn’t the consequence of a security flaw but an unintended configuration error on an endpoint that wasn’t being used by the entire Microsoft ecosystem.
Microsoft has assured its customers about fixing the misconfiguration and looking into potential Endpoint errors to provide a smooth experience to all partners.
The American computer software vendor has also commended SOCRadar for alerting the organization about the misconfigurations. However, it also pointed out the security researchers had “overstated the severity of this problem.
- A workable verification method is implemented to ensure users are who they say they are.
- Should adhere to the rules of data minimization by limiting the information in the results supplied to the confirmed user alone.
- When a corporation cannot reasonably identify which customers’ data was compromised, it should not then reveal specific user information (including metadata and filenames) that may belong to another customer.
Microsoft is currently focusing on contacting the impacted parties and giving them mitigation techniques to get in touch with the company and report the incident.