🚨 BREAKING

Critical SSRF in Microsoft Dynamics 365 Poses Spoofing Risk

Critical SSRF in Microsoft Dynamics 365 Poses Spoofing Risk

The National Vulnerability Database has disclosed CVE-2026-32210, a critical server-side request forgery (SSRF) vulnerability impacting Microsoft Dynamics 365 (Online). This flaw, rated 9.3 CVSS, allows an unauthenticated attacker to perform spoofing over a network. The high CVSS score, coupled with the network attack vector and no required user interaction (UI:R in vector refers to the user being the target of the spoofing, not an action needed for the attack), makes this a serious issue.

SSRF vulnerabilities are particularly dangerous because they enable attackers to force the server-side application to make requests to an arbitrary domain, often internal networks that are otherwise inaccessible. This can lead to information disclosure, port scanning, or even remote code execution in some scenarios. While the National Vulnerability Database specifies ‘spoofing’ as the primary impact, the nature of SSRF suggests broader implications for data confidentiality and integrity within Dynamics 365 environments.

Organizations running Microsoft Dynamics 365 (Online) must prioritize assessing their exposure. Given the ‘critical’ severity and unauthenticated nature, this vulnerability presents a significant attack surface. Defenders should monitor Microsoft’s security advisories closely for patches and mitigation guidance, as the National Vulnerability Database has not yet specified affected product versions.

What This Means For You

  • If your organization relies on Microsoft Dynamics 365 (Online), this critical SSRF vulnerability is a direct threat. You need to immediately track Microsoft's official security updates for CVE-2026-32210 and prepare to patch or implement any recommended mitigations. An unauthenticated network attacker could spoof internal systems, potentially leading to unauthorized access or data exfiltration.
🛡️ Am I exposed to this? Get detection rules for CVE-2026-32210 — Splunk, Sentinel, Elastic, QRadar & more

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

critical T1190 Initial Access

Microsoft Dynamics 365 SSRF via specific parameter - CVE-2026-32210

Sigma YAML — free preview
✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-32210 SSRF Microsoft Dynamics 365 (Online)
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 24, 2026 at 01:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related Posts

CVE-2026-6732 — Libxml2 Denial of Service

CVE-2026-6732 — A flaw was found in libxml2. This vulnerability occurs when the library processes a specially crafted XML Schema Definition (XSD) validated document that...

vulnerabilityCVEmedium-severitydenial-of-servicecwe-843
/SCW Vulnerability Desk /MEDIUM /6.5 /⚑ 2 IOCs /⚙ 2 Sigma

OpenShell Mirror Mode Allows Arbitrary Code Execution

CVE-2026-41355 — OpenShell before 2026.3.28 contains an arbitrary code execution vulnerability in mirror mode that converts untrusted sandbox files into workspace hooks. Attackers with mirror...

vulnerabilityCVEhigh-severitycode-executioncwe-829
/SCW Vulnerability Desk /HIGH /7.3 /⚑ 4 IOCs /⚙ 3 Sigma

OpenClaw: High-Severity Access Control Bypass Looms

CVE-2026-41353 — OpenClaw before 2026.3.22 contains an access control bypass vulnerability in the allowProfiles feature that allows attackers to circumvent profile restrictions through persistent profile...

vulnerabilityCVEhigh-severitycwe-472
/SCW Vulnerability Desk /HIGH /8.1 /⚑ 4 IOCs /⚙ 2 Sigma