Impact
This vulnerability is caused by improper neutralization of special elements used in a command, which allows an unauthorized attacker to cause the Microsoft 365 Copilot service to disclose information over a network. The flaw does not grant full code execution or privilege escalation but enables retrieval of data that the attacker is not permitted to view. The impact is limited to confidentiality breach and does not affect integrity or availability.
Affected Systems
Microsoft 365 Copilot, provided by Microsoft. The advisory does not specify exact versions; any instance of the Copilot service that has not yet received the vendor’s fix remains at risk.
Risk and Exploitability
The CVSS score of 6.5 denotes moderate severity with a confidentiality impact. The EPSS score is not available, so the likelihood of public exploitation cannot be precisely quantified. It is not listed in CISA’s KEV catalog, indicating no confirmed widespread exploitation. The description suggests that an attacker must be able to interact with the Copilot service over the network and supply crafted input that the service incorrectly processes in a command context. Recovering from the flaw requires the attacker to be able to reach the service and influence its command execution path.
OpenCVE Enrichment