CVE-2026-26123: CWE-939: Improper Authorization in Handler for Custom URL Scheme in Microsoft Microsoft Authenticator for Android
Cwe is not in rca categories in Microsoft Authenticator allows an unauthorized attacker to disclose information locally.
AI Analysis
Technical Summary
CVE-2026-26123 is a vulnerability identified in Microsoft Authenticator for Android version 6.0.0, categorized under CWE-939, which pertains to improper authorization in the handling of custom URL schemes. Custom URL schemes allow apps to be invoked via specially crafted URLs, enabling inter-app communication or triggering specific app functions. In this case, the Microsoft Authenticator app's handler for such URLs does not properly enforce authorization checks, permitting an unauthorized attacker to trigger the handler and cause local disclosure of sensitive information stored or accessible by the app. The vulnerability requires user interaction (e.g., clicking a malicious link) but does not require any privileges or prior authentication, making it accessible to a wide range of threat actors. The CVSS v3.1 score of 5.5 reflects a medium severity, with a vector indicating local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), and high confidentiality impact (C:H) but no integrity or availability impact. No known exploits have been reported in the wild, and no patches have been published at the time of analysis. The flaw could allow attackers to extract sensitive authentication-related data or tokens from the device, potentially undermining user security and privacy. Given the critical role of Microsoft Authenticator in multi-factor authentication workflows, any leakage of sensitive data could facilitate further attacks such as account takeover or phishing. However, the requirement for local access and user interaction limits the attack surface. This vulnerability highlights the importance of rigorous authorization checks in custom URL scheme handlers to prevent unauthorized data exposure.
Potential Impact
The primary impact of CVE-2026-26123 is the unauthorized disclosure of sensitive information stored or accessible by Microsoft Authenticator on affected Android devices. This compromises confidentiality, potentially exposing authentication tokens, credentials, or other sensitive data used in multi-factor authentication processes. While integrity and availability remain unaffected, the confidentiality breach could enable attackers to bypass or weaken authentication protections, increasing the risk of account compromise. The requirement for local access and user interaction reduces the likelihood of large-scale remote exploitation but does not eliminate risk in environments where attackers can trick users into clicking malicious links or have physical or remote access to devices. Organizations relying heavily on Microsoft Authenticator for secure access to corporate resources, especially those with high-value or sensitive data, face increased risk of credential theft and subsequent unauthorized access. This could lead to data breaches, compliance violations, and reputational damage. The absence of known exploits and patches currently limits immediate impact but underscores the need for vigilance and prompt remediation once fixes are available.
Mitigation Recommendations
To mitigate the risks posed by CVE-2026-26123, organizations and users should: 1) Restrict the use of Microsoft Authenticator on devices where local access cannot be tightly controlled, especially shared or publicly accessible devices. 2) Educate users to avoid clicking on untrusted or suspicious links that could invoke malicious custom URL schemes. 3) Monitor device and app behavior for unusual URL scheme invocations or unexpected app launches that could indicate exploitation attempts. 4) Implement mobile device management (MDM) policies to control app permissions and restrict installation of untrusted apps that might facilitate exploitation. 5) Regularly check for and apply security updates from Microsoft as soon as patches addressing this vulnerability become available. 6) Consider additional layers of security such as hardware-based authentication tokens or biometric verification to reduce reliance on software authenticators alone. 7) Conduct security assessments and penetration testing focused on inter-app communication and URL scheme handling to identify similar weaknesses. These measures go beyond generic advice by focusing on controlling the attack vector (custom URL schemes), user behavior, and device security posture.
Affected Countries
United States, India, Germany, United Kingdom, Canada, Australia, France, Brazil, Japan, South Korea
CVE-2026-26123: CWE-939: Improper Authorization in Handler for Custom URL Scheme in Microsoft Microsoft Authenticator for Android
Description
Cwe is not in rca categories in Microsoft Authenticator allows an unauthorized attacker to disclose information locally.
AI-Powered Analysis
Technical Analysis
CVE-2026-26123 is a vulnerability identified in Microsoft Authenticator for Android version 6.0.0, categorized under CWE-939, which pertains to improper authorization in the handling of custom URL schemes. Custom URL schemes allow apps to be invoked via specially crafted URLs, enabling inter-app communication or triggering specific app functions. In this case, the Microsoft Authenticator app's handler for such URLs does not properly enforce authorization checks, permitting an unauthorized attacker to trigger the handler and cause local disclosure of sensitive information stored or accessible by the app. The vulnerability requires user interaction (e.g., clicking a malicious link) but does not require any privileges or prior authentication, making it accessible to a wide range of threat actors. The CVSS v3.1 score of 5.5 reflects a medium severity, with a vector indicating local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), and high confidentiality impact (C:H) but no integrity or availability impact. No known exploits have been reported in the wild, and no patches have been published at the time of analysis. The flaw could allow attackers to extract sensitive authentication-related data or tokens from the device, potentially undermining user security and privacy. Given the critical role of Microsoft Authenticator in multi-factor authentication workflows, any leakage of sensitive data could facilitate further attacks such as account takeover or phishing. However, the requirement for local access and user interaction limits the attack surface. This vulnerability highlights the importance of rigorous authorization checks in custom URL scheme handlers to prevent unauthorized data exposure.
Potential Impact
The primary impact of CVE-2026-26123 is the unauthorized disclosure of sensitive information stored or accessible by Microsoft Authenticator on affected Android devices. This compromises confidentiality, potentially exposing authentication tokens, credentials, or other sensitive data used in multi-factor authentication processes. While integrity and availability remain unaffected, the confidentiality breach could enable attackers to bypass or weaken authentication protections, increasing the risk of account compromise. The requirement for local access and user interaction reduces the likelihood of large-scale remote exploitation but does not eliminate risk in environments where attackers can trick users into clicking malicious links or have physical or remote access to devices. Organizations relying heavily on Microsoft Authenticator for secure access to corporate resources, especially those with high-value or sensitive data, face increased risk of credential theft and subsequent unauthorized access. This could lead to data breaches, compliance violations, and reputational damage. The absence of known exploits and patches currently limits immediate impact but underscores the need for vigilance and prompt remediation once fixes are available.
Mitigation Recommendations
To mitigate the risks posed by CVE-2026-26123, organizations and users should: 1) Restrict the use of Microsoft Authenticator on devices where local access cannot be tightly controlled, especially shared or publicly accessible devices. 2) Educate users to avoid clicking on untrusted or suspicious links that could invoke malicious custom URL schemes. 3) Monitor device and app behavior for unusual URL scheme invocations or unexpected app launches that could indicate exploitation attempts. 4) Implement mobile device management (MDM) policies to control app permissions and restrict installation of untrusted apps that might facilitate exploitation. 5) Regularly check for and apply security updates from Microsoft as soon as patches addressing this vulnerability become available. 6) Consider additional layers of security such as hardware-based authentication tokens or biometric verification to reduce reliance on software authenticators alone. 7) Conduct security assessments and penetration testing focused on inter-app communication and URL scheme handling to identify similar weaknesses. These measures go beyond generic advice by focusing on controlling the attack vector (custom URL schemes), user behavior, and device security posture.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- microsoft
- Date Reserved
- 2026-02-11T15:52:13.911Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69b071392f860ef943a5fd50
Added to database: 3/10/2026, 7:30:01 PM
Last enriched: 3/10/2026, 7:46:03 PM
Last updated: 3/13/2026, 3:57:13 PM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.