Microsoft Teams Impersonation and Spoofing Vulnerabilities Exposed

Microsoft Teams Impersonation and Spoofing Vulnerabilities Exposed

Check Point Research discovered four Microsoft Teams vulnerabilities that let external guests and malicious insiders impersonate executives, edit messages without leaving an “Edited” label, manipulate notifications, change private chat display names, and forge caller identities in calls. Microsoft addressed the issues after disclosure (one tracked as CVE-2024-38197) with fixes rolled out between May 2024 and October 2025. #MicrosoftTeams #CVE-2024-38197

Keypoints

  • Check Point Research identified four distinct vulnerabilities in Microsoft Teams enabling message editing without trace, notification spoofing, private chat display-name manipulation, and caller identity forgery in calls.
  • Both external guest accounts and malicious insiders can exploit these flaws to impersonate trusted personnel, including executives, undermining organizational trust.
  • Real-world risks include executive impersonation, financial fraud, credential harvesting, malware delivery, misinformation campaigns, and disruption of sensitive briefings.
  • The issues were responsibly disclosed to Microsoft on 23 March 2024 and were progressively fixed between 8 May 2024 and October 2025; one issue was tracked as CVE-2024-38197.
  • Exploitation techniques rely on manipulating Teams’ web JSON payloads and API parameters such as imdisplayname, displayName, clientmessageid, and conversation topic fields.
  • Mitigations recommended include Zero Trust access controls, advanced threat prevention, DLP, user verification protocols, and heightened user awareness for out-of-band validation.

MITRE Techniques

  • [T1195 ] Supply Chain Compromise – The article notes threat actors targeting widely-used platforms as part of broader campaigns, highlighting supply chain risks. (‘Supply chain attacks targeting widely-used software platforms’)
  • [T1566 ] Phishing (Social Engineering) – Attackers use trusted communication channels and social engineering tactics via Teams to deceive users and induce actions. (‘Social engineering campaigns leveraging trusted communication channels’)
  • [T1566.003 ] Spearphishing via Service – The research demonstrates crafting payloads (e.g., bot/webhook messages) that spoof senders within the Teams interface to impersonate trusted users. (‘we developed a proof-of-concept showing how a malicious bot or webhook could craft payloads with falsified “from” attributes’)
  • [T1589 ] Gather Victim Identity Information – Techniques described include credential harvesting and impersonation to obtain sensitive identity-related data for fraud or access. (‘Credential harvesting operations targeting remote workforce tools’)
  • [T1204 ] User Execution – Malware delivery scenarios rely on users clicking malicious links or executing content delivered via spoofed Teams messages or notifications. (‘Malware Delivery: Attackers can send a spoofed notification… asking for urgent action or clicking a link, which then installs malware.’)
  • [T1041 ] Exfiltration Over Command and Control (Data Exfiltration) – The report links manipulated communications to potential data exfiltration and advanced persistent threat activity. (‘Advanced Persistent Threats and Data Exfiltration’)
  • [T1036 ] Masquerading – Impersonation and forged caller/display names in messages and calls reflect masquerading techniques to appear as legitimate internal users. (‘an attacker could convincingly appear to be the CEO’)
  • [T1078 ] Valid Accounts – The findings show both guest accounts and malicious insiders abusing legitimate account contexts to bypass trust boundaries. (‘both external guest users and internal malicious actors can effectively transform their identity to appear as trusted personnel’)
  • [T1565 ] Stored Data Manipulation – The ability to edit messages without leaving an “Edited” label and to alter conversation topics represents manipulation of stored message data. (‘Edit Messages Without Trace: We discovered a method to alter the content of sent messages without leaving the usual “Edited” label.’)

Indicators of Compromise

  • [CVE ] vulnerability identifier reported and tracked – CVE-2024-38197
  • [API Endpoint ] endpoints and request paths used in research/exploitation – POST /api/v2/epconv (call initiation), PUT /api/chatsvc/emea/v1/threads//properties?name=topic
  • [UUID/User ID ] internal user identifier format used to target/identify users – example: 8:orgid:37f85325
  • [Message Parameters ] request fields and values leveraged for manipulation – clientmessageid 2711247313308716623, OriginalArrivalTime 1709414616944
  • [Domain/URL ] research disclosure and briefing link – https://pages.checkpoint.com/2025-nov-ww-critical-microsoft-teams-vulnerabilities-uncovered.html


Read more: https://research.checkpoint.com/2025/microsoft-teams-impersonation-and-spoofing-vulnerabilities-exposed/