Microsoft has addressed a critical security flaw affecting its Power Platform, but not without facing criticism for the delay in its response. The vulnerability pertained to unauthorized access to Custom Code functions within Power Platform custom connectors, potentially leading to unintended information disclosure if sensitive data was embedded. The company assured that no customer action was necessary and no evidence of active exploitation was detected. The flaw was brought to Microsoft’s attention by Tenable, which highlighted that the issue could enable limited unauthorized access to cross-tenant applications and sensitive data.
The cybersecurity firm Tenable identified the vulnerability, attributing it to insufficient access control in Azure Function hosts, which could allow a threat actor to intercept OAuth client IDs, secrets, and other authentication methods.
While an initial fix was issued on June 7, 2023, the flaw was fully patched only by August 2, 2023. Tenable’s CEO Amit Yoran criticized Microsoft for its slow response, stating that the shared responsibility model of cloud providers is compromised if vendors don’t promptly notify customers of issues and openly apply fixes.
Microsoft, in its defense, emphasized its thorough investigation and fix deployment process, acknowledging the delicate balance between speed and quality in developing security updates.
The company explained that not all fixes are equal, some requiring quicker deployment, while others take longer due to complexities. Microsoft further outlined its proactive approach to monitoring and swiftly addressing reported security vulnerabilities to safeguard customers from potential exploits. This incident underscores the ongoing challenge of managing security vulnerabilities while ensuring effective communication and transparency in the face of evolving cybersecurity threats.