Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26120: CWE-918: Server-Side Request Forgery (SSRF) in Microsoft Microsoft Bing

0
Medium
VulnerabilityCVE-2026-26120cvecve-2026-26120cwe-918
Published: Thu Mar 19 2026 (03/19/2026, 21:06:23 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft Bing

Description

CVE-2026-26120 is a server-side request forgery (SSRF) vulnerability in Microsoft Bing that allows an attacker to induce the server to make unauthorized network requests. The vulnerability requires no authentication or user interaction and has a CVSS score of 6. 5, indicating medium severity. Exploitation could lead to limited confidentiality loss and availability impact, but no integrity compromise is reported. No known exploits are currently in the wild, and no patches have been published yet. The vulnerability could be leveraged to access internal resources or perform network reconnaissance. Organizations relying on Microsoft Bing services should monitor for updates and consider network-level protections. Countries with significant Bing usage and strategic interest in Microsoft services are at higher risk. Immediate mitigation involves network segmentation and monitoring outbound requests from Bing-related infrastructure. This vulnerability highlights the need for careful validation of server-side requests to prevent SSRF attacks.

AI-Powered Analysis

AILast updated: 03/19/2026, 21:40:50 UTC

Technical Analysis

CVE-2026-26120 is a server-side request forgery (SSRF) vulnerability identified in Microsoft Bing. SSRF vulnerabilities occur when an attacker can manipulate a server to send crafted requests to unintended locations, potentially accessing internal or protected network resources. In this case, the vulnerability allows an unauthorized attacker to cause Microsoft Bing's backend systems to perform network requests without proper authorization or validation. The CVSS 3.1 base score is 6.5, reflecting a medium severity level, with the vector indicating that the attack can be performed remotely (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to confidentiality loss (C:L) and availability (A:L), with no integrity impact. The exploitability is partially confirmed (E:P), and the report confidence is confirmed (RC:C). No affected versions are explicitly listed, and no patches have been released at the time of publication. No known exploits have been observed in the wild. The vulnerability falls under CWE-918, which covers SSRF issues where the server is tricked into making unintended requests. This can lead to information disclosure, internal network scanning, or denial of service if exploited effectively. Since Bing is a widely used search engine and service platform, the vulnerability could have broad implications if exploited at scale.

Potential Impact

The primary impact of CVE-2026-26120 is the potential for attackers to leverage Microsoft Bing's backend to access internal network resources that are otherwise inaccessible externally. This could lead to limited information disclosure, such as internal IP addresses or metadata, and potentially disrupt service availability by causing resource exhaustion or denial of service conditions. Although the integrity of data is not directly affected, the confidentiality and availability impacts could affect organizations relying on Bing services or integrated Microsoft platforms. Attackers could use this SSRF to pivot within networks, potentially escalating attacks if combined with other vulnerabilities. The lack of required authentication and user interaction increases the risk of exploitation. However, the absence of known exploits and patches suggests that immediate widespread impact is limited but could increase if exploit code becomes available. Organizations worldwide using Microsoft Bing or related services may face risks, especially those with sensitive internal networks accessible indirectly through Bing's infrastructure.

Mitigation Recommendations

To mitigate CVE-2026-26120, organizations should implement network-level controls to restrict and monitor outbound requests originating from Microsoft Bing infrastructure or related services. Employ strict egress filtering and segmentation to prevent unauthorized internal resource access via SSRF. Monitor logs for unusual or unexpected outbound requests that could indicate exploitation attempts. Microsoft should prioritize releasing a patch or update to validate and sanitize all server-side request inputs within Bing's backend systems. Until a patch is available, consider deploying web application firewalls (WAFs) with custom rules to detect SSRF patterns targeting Bing services. Security teams should also conduct internal network scans to identify and secure any sensitive resources that could be exposed through SSRF. Regularly update threat intelligence feeds to detect emerging exploit attempts. Finally, educate incident response teams on SSRF indicators and response procedures specific to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2026-02-11T15:52:13.911Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bc698ce32a4fbe5ffae007

Added to database: 3/19/2026, 9:24:28 PM

Last enriched: 3/19/2026, 9:40:50 PM

Last updated: 3/19/2026, 11:41:49 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses