CVE-2026-32210

Microsoft · Dynamics

A Server-Side Request Forgery (SSRF) vulnerability in Microsoft Dynamics 365 (Online) allows an unauthorized attacker to perform spoofing over a network.

Executive summary

A critical SSRF vulnerability in Microsoft Dynamics 365 enables unauthenticated attackers to conduct spoofing attacks, posing a high risk to business application integrity.

Vulnerability

This SSRF vulnerability allows an unauthorized attacker to manipulate the server into making unintended requests. This capability can be leveraged to spoof trusted network entities and potentially bypass security controls.

Business impact

A CVSS score of 9.3 indicates a critical risk to the confidentiality and integrity of business-critical data stored within Dynamics 365. Exploitation could allow attackers to interact with internal services that are not exposed to the public internet.

Remediation

Immediate Action: Apply all available patches for Microsoft Dynamics 365 as directed by the vendor.

Proactive Monitoring: Monitor for unusual outbound traffic originating from the Dynamics environment and review logs for suspicious request patterns.

Compensating Controls: Restrict server network access to known-good endpoints and utilize WAF rules to block malicious request structures.

Exploitation status

Public Exploit Available: No

Analyst recommendation

Given the central role Dynamics 365 plays in business operations, this vulnerability must be addressed immediately. Organizations should verify their patch status and ensure that network-level restrictions are in place to limit the exposure of the application.