CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Microsoft Teams Guest Access Bypasses Defender for Office 365 Protections

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

Researchers discovered a security blind spot in Microsoft Teams guest access that allows attackers to bypass Microsoft Defender for Office 365 protections. When users join an external tenant as guests, their security protections are determined by the hosting environment, not their home organization. This vulnerability enables attackers to create 'protection-free zones' by setting up malicious tenants with minimal security policies and inviting targets to join as guests, bypassing email security checks and delivering phishing or malware-laden content. The issue arises because Microsoft Defender for Office 365 protections do not apply when a user accepts a guest invitation to an external tenant, subjecting them to the security policies of the hosting tenant. Organizations are advised to restrict B2B collaboration settings, implement cross-tenant access controls, and train users to be cautious of unsolicited Teams invites.

Timeline

  1. 28.11.2025 10:33 1 articles · 23h ago

    Microsoft Teams Guest Access Vulnerability Disclosed

    Researchers identified a security blind spot in Microsoft Teams guest access that allows attackers to bypass Microsoft Defender for Office 365 protections. By setting up malicious tenants with minimal security policies, attackers can invite targets to join as guests, bypassing email security checks and delivering phishing or malware-laden content. Organizations are advised to restrict B2B collaboration settings and implement cross-tenant access controls to mitigate the risk.

    Show sources

Information Snippets