
"Researchers at Check Point this week revealed four flaws in Teams that, if exploited, could have fundamentally broken the trust that underpins communication inside organizations. Together, they made it possible to alter messages without the "Edited" label, spoof alerts to make them appear from trusted colleagues, rename chats to change who they appeared to be with, and even forge caller identities in audio or video calls."
"According to the researchers, the vulnerabilities exploited Teams' own messaging architecture. By reusing unique message identifiers, Check Point found it was possible to silently overwrite existing chat content, removing the audit trail that normally shows when a message has been edited. Another bug allowed attackers to alter notification parameters so alerts appeared to come from any chosen name - an easy way to simulate a message from a CEO or finance director."
Four vulnerabilities in Microsoft Teams allowed attackers to impersonate executives, rewrite chat history without an "Edited" label, spoof notifications from chosen names, rename chats to alter perceived participants, and forge caller identities in audio and video calls. The flaws exploited Teams' messaging architecture by reusing unique message identifiers to silently overwrite chat content and by altering notification parameters to make alerts appear from trusted colleagues. One issue was tracked as CVE-2024-38197. Patches were issued throughout 2024, with the final fix for caller identity completed at the end of October 2025, impacting over 320 million monthly users and threatening digital trust and verification.
Read at Theregister
Unable to calculate read time
Collection
[
|
...
]