Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21355: CWE-306: Missing Authentication for Critical Function in Microsoft Microsoft Bing

0
High
VulnerabilityCVE-2025-21355cvecve-2025-21355cwe-306
Published: Wed Feb 19 2025 (02/19/2025, 22:18:21 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft Bing

Description

Missing Authentication for Critical Function in Microsoft Bing allows an unauthorized attacker to execute code over a network

AI-Powered Analysis

AILast updated: 12/17/2025, 23:02:36 UTC

Technical Analysis

CVE-2025-21355 is a vulnerability identified in Microsoft Bing involving CWE-306, which denotes missing authentication for a critical function. This flaw allows an unauthenticated attacker to execute code remotely over the network, exploiting a critical function that should have been protected by authentication mechanisms. The vulnerability does not require any privileges or user interaction, increasing its risk profile. The CVSS 3.1 score of 8.6 reflects a high severity, with the vector indicating network attack (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a scope change (S:C). The impact is primarily on confidentiality (C:H), with no impact on integrity (I:N) or availability (A:N). The exploitability is rated as proof-of-concept (E:P), and the remediation level is official fix (RL:O) with confirmed report confidence (RC:C). No affected versions are specified, suggesting the vulnerability may affect current or future Bing implementations. No patches or known exploits are currently available, but the critical nature of the flaw necessitates prompt mitigation once fixes are released. The missing authentication could allow attackers to access sensitive data or execute unauthorized commands within Bing's infrastructure, potentially leading to data breaches or unauthorized data disclosure.

Potential Impact

For European organizations, this vulnerability poses a significant risk to confidentiality, particularly for entities that integrate Microsoft Bing services into their operations or rely on Bing for data retrieval and processing. Unauthorized code execution could lead to data leakage, exposure of sensitive information, or unauthorized access to internal systems if Bing is used as a component in broader enterprise workflows. The lack of integrity and availability impact reduces the risk of data tampering or service disruption, but the confidentiality breach alone can have severe regulatory and reputational consequences under GDPR and other European data protection laws. Organizations in sectors such as finance, healthcare, and government, which handle sensitive personal or classified data, are particularly vulnerable. The network-based attack vector and no requirement for user interaction increase the likelihood of exploitation if the vulnerability is weaponized. The absence of known exploits currently provides a window for proactive mitigation.

Mitigation Recommendations

Since no official patches are currently available, European organizations should implement compensating controls immediately. These include restricting network access to Microsoft Bing services to trusted IP ranges, employing network segmentation to isolate critical systems from Bing integrations, and monitoring network traffic for unusual or unauthorized requests targeting Bing endpoints. Organizations should also enable advanced logging and alerting on Bing service interactions to detect potential exploitation attempts. Once Microsoft releases patches or updates, organizations must prioritize timely deployment across all affected systems. Additionally, reviewing and tightening authentication and access controls around any Bing-related functions or APIs within enterprise environments can reduce exposure. Engaging with Microsoft support channels for guidance and subscribing to security advisories will ensure rapid response to emerging exploit information. Finally, conducting internal security assessments and penetration testing focusing on Bing integrations can help identify and remediate potential attack vectors.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2024-12-11T00:29:48.355Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69432f00058703ef3fc98020

Added to database: 12/17/2025, 10:30:24 PM

Last enriched: 12/17/2025, 11:02:36 PM

Last updated: 2/6/2026, 8:17:31 AM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats