Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62206: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Microsoft Dynamics 365 (on-premises) version 9.1

0
Medium
VulnerabilityCVE-2025-62206cvecve-2025-62206cwe-200
Published: Tue Nov 11 2025 (11/11/2025, 17:59:28 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft Dynamics 365 (on-premises) version 9.1

Description

Exposure of sensitive information to an unauthorized actor in Microsoft Dynamics 365 (on-premises) allows an unauthorized attacker to disclose information over a network.

AI-Powered Analysis

AILast updated: 01/02/2026, 23:18:39 UTC

Technical Analysis

CVE-2025-62206 is an information disclosure vulnerability classified under CWE-200 affecting Microsoft Dynamics 365 (on-premises) version 9.1 and earlier (including 9.0). The vulnerability allows an unauthorized attacker to remotely disclose sensitive information over a network without requiring privileges, though user interaction is necessary. The CVSS v3.1 score is 6.5 (medium severity), reflecting a high confidentiality impact but no impact on integrity or availability. The attack vector is network-based with low complexity, meaning an attacker can exploit this flaw remotely with relative ease if a user interacts with a crafted request or payload. The vulnerability arises from improper access control or insufficient validation in the Dynamics 365 on-premises deployment, potentially exposing sensitive business data or personally identifiable information to unauthorized actors. No public exploits or active exploitation have been reported yet, but the exposure risk is significant given the widespread use of Dynamics 365 in enterprise environments. The lack of a patch link indicates that a fix may be pending or in development, emphasizing the need for interim mitigations. This vulnerability highlights the risks associated with on-premises deployments of complex enterprise software where network exposure and user interaction can lead to data leaks.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive business and customer data managed within Microsoft Dynamics 365 on-premises environments. Exposure of such information could lead to regulatory non-compliance, especially under GDPR, resulting in legal penalties and reputational damage. Industries such as finance, healthcare, manufacturing, and government agencies that rely heavily on Dynamics 365 for CRM and ERP functions are particularly vulnerable. The medium severity rating reflects the absence of integrity or availability impacts, but the high confidentiality impact means data breaches could occur without system disruption, making detection harder. Since exploitation requires user interaction, phishing or social engineering could be leveraged to trigger the vulnerability. The lack of known exploits in the wild currently reduces immediate risk, but the ease of network exploitation and the critical nature of the data involved make this a priority for security teams. European organizations with exposed on-premises Dynamics 365 installations should consider this a moderate to high risk until patched.

Mitigation Recommendations

1. Limit network exposure of Microsoft Dynamics 365 (on-premises) servers by restricting access to trusted internal networks or VPNs only. 2. Implement strict firewall rules and network segmentation to isolate Dynamics 365 environments from general internet access. 3. Educate users about phishing and social engineering risks to reduce the likelihood of user interaction exploitation. 4. Monitor network traffic and logs for unusual access patterns or data exfiltration attempts related to Dynamics 365 services. 5. Apply principle of least privilege for user accounts interacting with Dynamics 365 to minimize potential data exposure. 6. Regularly check for and apply official Microsoft patches or security updates addressing CVE-2025-62206 as soon as they become available. 7. Consider deploying web application firewalls (WAF) or intrusion detection/prevention systems (IDS/IPS) to detect and block suspicious requests targeting Dynamics 365. 8. Conduct internal security assessments and penetration tests focusing on Dynamics 365 on-premises deployments to identify and remediate configuration weaknesses.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-10-08T20:10:09.346Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69137c4b47ab3590319dbebe

Added to database: 11/11/2025, 6:11:23 PM

Last enriched: 1/2/2026, 11:18:39 PM

Last updated: 1/7/2026, 6:12:13 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats