Microsoft Copilot ignored sensitivity labels and DLP policies twice in eight months, accessing and summarizing confidential emails undetected. Incidents included a four-week bug affecting the UK's NHS and a prior zero-click EchoLeak exploit. Traditional tools like EDR and WAF failed due to violations occurring in Copilot's internal retrieval pipeline.
Key Points
- 1.Four-week Jan bug (CW1226324) let Copilot process Sent Items/Drafts despite labels
- 2.June 2025 CVE-2025-32711 EchoLeak enabled zero-click data exfiltration via malicious email
- 3.Affected regulated orgs like UK NHS (INC46740412)
- 4.No DLP/EDR/WAF detected as violations stayed in Microsoft's retrieval pipeline
Impact Analysis
Enterprises risk undetected leaks of sensitive data in AI assistants, especially in healthcare. Exposes gaps in legacy security for LLM pipelines, prompting need for AI-specific monitoring.
Technical Details
CW1226324 stemmed from code-path error allowing labeled Sent Items/Drafts into retrieval. EchoLeak bypassed prompt injection classifier, link redaction, and CSP for silent exfiltration. Both occurred between retrieval index and generation model, invisible to perimeter tools.
