Particle.news

Download on the App Store

Microsoft Seals EchoLeak Zero-Click Vulnerability in 365 Copilot

Microsoft’s server-side patch removes the attack vector, underscoring the need for AI agents to segregate trusted commands from untrusted inputs.

Image

Overview

  • Researchers at Aim Labs discovered in January that a zero-click flaw dubbed EchoLeak could exfiltrate data from Microsoft 365 Copilot by embedding hidden prompts in a standard-looking email.
  • Microsoft assigned the critical CVE-2025-32711 designation to the vulnerability and deployed a server-side fix in May that requires no action from customers.
  • The company reports no evidence that the EchoLeak flaw was exploited in real-world attacks after the patch was applied.
  • EchoLeak exemplifies a broader 'LLM Scope Violation' vulnerability in AI agents that allows unauthorized access to privileged data without user interaction.
  • Security experts warn that fully preventing such leaks will demand a fundamental redesign of AI agent frameworks to isolate trusted instructions from untrusted inputs.