Impact
The vulnerability involves an AI command injection flaw in the Microsoft 365 Copilot component that lets an attacker, without authorization, cause the application to leak sensitive data over the network. It is a classic command injection, enabling the execution of unintended commands and resulting in the disclosure of confidential information such as user data and configuration. The impact is a loss of confidentiality.
Affected Systems
Affected products span the Microsoft 365 suite, particularly the Copilot implementations for Android and iOS, as well as core Office applications such as Edge, Excel, Loop, OneNote, Outlook, PowerBI, PowerPoint, Teams, and Word on both Android and iOS platforms. No specific affected release numbers are disclosed, so all current releases of these components should be considered vulnerable until Microsoft releases an update.
Risk and Exploitability
The CVSS score of 7.1 indicates moderate to high severity, while the EPSS score of less than 1% suggests a low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog, reducing the likelihood of active exploitation. Based on the description, the attack vector would likely involve a network-based command sent to the Copilot service, requiring the attacker’s ability to interact with the application, possibly through a malicious user prompt. Consequently, the risk to an organization is significant if the affected applications remain unpatched, but current exploitation likelihood is low.
OpenCVE Enrichment