Skip to main content

CVE-2025-53728: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Microsoft Dynamics 365 (on-premises) version 9.1

Medium
VulnerabilityCVE-2025-53728cvecve-2025-53728cwe-200
Published: Tue Aug 12 2025 (08/12/2025, 17:10:30 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft Dynamics 365 (on-premises) version 9.1

Description

Exposure of sensitive information to an unauthorized actor in Microsoft Dynamics 365 (on-premises) allows an unauthorized attacker to disclose information over a network.

AI-Powered Analysis

AILast updated: 08/12/2025, 18:52:30 UTC

Technical Analysis

CVE-2025-53728 is a vulnerability identified in Microsoft Dynamics 365 (on-premises) version 9.1, specifically affecting version 9.0. This vulnerability is classified under CWE-200, which pertains to the exposure of sensitive information to unauthorized actors. The flaw allows an attacker to disclose sensitive information over a network without requiring any privileges (PR:N) but does require user interaction (UI:R). The attack vector is network-based (AV:N), meaning the attacker can exploit this vulnerability remotely. The vulnerability does not impact the integrity or availability of the system but has a high impact on confidentiality (C:H). The scope is unchanged (S:U), indicating the vulnerability affects only the vulnerable component itself. The CVSS 3.1 base score is 6.5, categorizing it as a medium severity issue. The vulnerability is currently published and has no known exploits in the wild. No patches or mitigation links were provided at the time of publication. The vulnerability could allow unauthorized actors to intercept or access sensitive business data managed within Microsoft Dynamics 365, potentially including customer information, financial data, or internal communications, depending on the deployment and configuration. Given that Dynamics 365 is often integrated into enterprise resource planning and customer relationship management workflows, exposure of such data could lead to privacy violations, regulatory non-compliance, and reputational damage.

Potential Impact

For European organizations, the exposure of sensitive information via this vulnerability could have significant consequences. Many European companies rely on Microsoft Dynamics 365 for critical business operations, including customer data management and financial processes. Unauthorized disclosure of sensitive data could lead to breaches of the EU General Data Protection Regulation (GDPR), resulting in substantial fines and legal repercussions. Additionally, leaked information could be leveraged by threat actors for targeted phishing, social engineering, or further intrusion attempts. The medium severity rating suggests that while the vulnerability does not allow direct system compromise or data manipulation, the confidentiality breach alone is impactful, especially in sectors handling personal data, healthcare, finance, or government information. The requirement for user interaction means that phishing or social engineering could be vectors to exploit this vulnerability, increasing the risk in environments with less security awareness or insufficient user training.

Mitigation Recommendations

Given the absence of an official patch at the time of this report, European organizations should implement compensating controls to mitigate risk. These include: 1) Restricting network access to Microsoft Dynamics 365 on-premises servers by implementing strict firewall rules and network segmentation to limit exposure to untrusted networks. 2) Enhancing user awareness training to reduce the likelihood of successful social engineering or phishing attempts that could trigger the vulnerability. 3) Monitoring network traffic and logs for unusual access patterns or data exfiltration attempts related to Dynamics 365. 4) Applying the principle of least privilege to user accounts interacting with Dynamics 365 to minimize potential data exposure. 5) Preparing for rapid deployment of patches once Microsoft releases an official fix by maintaining an up-to-date asset inventory and patch management process. 6) Considering temporary use of additional encryption or data masking within Dynamics 365 workflows to protect sensitive information until the vulnerability is remediated.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-07-09T03:10:34.738Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689b774dad5a09ad00349218

Added to database: 8/12/2025, 5:18:05 PM

Last enriched: 8/12/2025, 6:52:30 PM

Last updated: 8/19/2025, 12:34:27 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats