Security researchers have uncovered a set of critical vulnerabilities within Microsoft Teams that could have allowed attackers to manipulate conversations, impersonate trusted colleagues, and exploit notifications to launch sophisticated social engineering attacks. These flaws fundamentally undermined the trust users place in the platform’s communication integrity.
The Core Vulnerabilities: A Breakdown of the Threats
Discovered by Check Point, the four security flaws targeted the very elements that ensure authenticity in digital communication. The vulnerabilities enabled attackers to:
- Edit Messages Without a Trace: Alter the content of sent messages without triggering the “Edited” label, making it impossible for the recipient to know the message had been tampered with.
- Spoof Sender Identities: Modify incoming notifications to change the apparent sender of a message. An attacker could make a message appear to come from a CEO or a trusted team member.
- Manipulate Private Chat Display Names: Change display names in private chat conversations by manipulating the conversation topic.
- Forge Caller Identities: Arbitrarily modify display names used in call notifications and during active calls, allowing for impersonation in real-time communication.
These attacks were feasible for both external guest users and internal malicious actors, posing a severe risk to organizational security.
The Real-World Impact: Erosion of Digital Trust
The implications of these vulnerabilities are profound. By eroding the fundamental trust required for effective collaboration, attackers could:
- Trick employees into clicking malicious links by making them appear to come from a trusted source.
- Persuade victims to share sensitive data or credentials by impersonating an executive.
- Conduct convincing phishing attacks entirely within the trusted environment of Microsoft Teams.
Check Point emphasized the gravity of the situation: “Together, these vulnerabilities show how attackers can erode the fundamental trust that makes collaboration workspace tools effective, turning Teams from a business enabler into a vector for deception.”

Microsoft’s Response and Patch Timeline
Following a responsible disclosure by Check Point in March 2024, Microsoft addressed the issues in a series of patches. The primary vulnerability was assigned CVE-2024-38197 (CVSS score: 6.5, Medium severity) and described as a spoofing issue in Teams for iOS.
The patching timeline was as follows:
- August 2024: Initial fixes released by Microsoft.
- September 2024: Subsequent patches rolled out.
- October 2025: Final patches deployed to fully resolve the issues.
The Broader Threat Landscape for Collaboration Tools
This discovery highlights the increasing targeting of enterprise collaboration platforms. Microsoft itself has acknowledged that the “extensive collaboration features and global adoption of Microsoft Teams make it a high-value target for both cybercriminals and state-sponsored actors.”
These platforms are weaponized at various stages of an attack, from initial contact via messaging to leveraging video-based screen-sharing for deeper network access.
Oded Vanunu, Head of Product Vulnerability Research at Check Point, summarized the new challenge: “Our research shows that threat actors don’t need to break in anymore; they just need to bend trust. Organizations must now secure what people believe, not just what systems process. Seeing isn’t believing anymore, verification is.”


