Description
Improper access control in M365 Copilot allows an authorized attacker to perform spoofing locally.
Published: 2026-05-12
Score: 4.4 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Improper access control in Microsoft 365 Copilot for Android allows an authorized attacker to spoof identity locally, potentially masquerading as another user or process within the same device. The flaw arises because the application does not enforce proper authorization before setting the identity state, which can lead to confusion about the true source of data or actions inside the app. Classified as CWE‑284, this weakening of authorization can result in credential theft or other unauthorized actions performed under a false identity, but it does not provide remote code execution or direct network compromise.

Affected Systems

All installations of Microsoft 365 Copilot for Android that are accessed by users with authorized Microsoft accounts are affected. The advisory does not list specific version ranges, so any unpatched version may be vulnerable. The vulnerability applies only to the local environment on the device and requires the attacker to have reasonable access to the device or user account.

Risk and Exploitability

The CVSS base score of 4.4 indicates moderate severity. No EPSS score is available, so the expected exploitation probability is unclear. The vulnerability is not featured in CISA’s KEV catalogue, implying no wide‑scale exploitation has been documented. An attacker would need an authenticated user with access to the device; the attack vector is therefore local and requires elevated privilege within the application.

Generated by OpenCVE AI on May 12, 2026 at 20:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest Microsoft 365 Copilot for Android update that contains the access‑control fix.
  • Restrict the application’s granted permissions to only those essential for Copilot functionality and remove any unnecessary ones to limit the attack surface.
  • Enable multi‑factor authentication for all Microsoft accounts that can launch Copilot to reduce the risk of credential compromise.
  • Monitor device and application logs for unexpected identity or authentication changes and investigate any suspicious activity.

Generated by OpenCVE AI on May 12, 2026 at 20:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft 365 Copilot Android
Vendors & Products Microsoft 365 Copilot Android

Tue, 12 May 2026 17:30:00 +0000

Type Values Removed Values Added
Description Improper access control in M365 Copilot allows an authorized attacker to perform spoofing locally.
Title Microsoft 365 Copilot for Android Spoofing Vulnerability
First Time appeared Microsoft
Microsoft 365 Copilot Android
Weaknesses CWE-284
CPEs cpe:2.3:a:microsoft:365_copilot_Android:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft 365 Copilot Android
References
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C'}


Subscriptions

Microsoft 365 Copilot Android 365 Copilot Android
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-05-12T17:53:51.744Z

Reserved: 2026-04-16T19:12:36.195Z

Link: CVE-2026-41100

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-12T18:17:21.507

Modified: 2026-05-12T18:17:21.507

Link: CVE-2026-41100

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T21:15:27Z

Weaknesses