A report released by Check Point Research on Tuesday highlights critical security flaws in Microsoft Teams that could allow attackers to manipulate communications and impersonate individuals, including high-level executives.
Researchers identified four key vulnerabilities that could be exploited by both external hackers and malicious insiders. These flaws enable attackers to:
- Edit messages without triggering the “edited” label.
- Spoof message notifications, making them appear to come from another user.
- Alter display names in private chats.
- Fake caller identities during video and audio calls.
With over 320 million users, Microsoft Teams is one of the most widely used enterprise messaging platforms globally. The report comes amid a surge in social engineering and vishing attacks, where threat actors use deceptive messages and calls to compromise business communications and gain access to privileged accounts.
Check Point emphasized that addressing these vulnerabilities required deep architectural changes to Teams. Oded Vanunu, head of product vulnerability research at Check Point, noted that each fix added a new logic layer to mitigate the issues.
Microsoft acknowledged one of the vulnerabilities—notification spoofing—under CVE-2024-38197, and issued guidance last year. Additional related flaws were resolved in October, with the most recent fixes targeting audio and video message spoofing completed last month.
Found this article interesting? Follow us on X(Twitter) ,Threads and FaceBook to read more exclusive content we post.

