Microsoft Authenticator Vulnerability Exposes MFA Codes to Malicious Apps
A critical vulnerability (CVE-2026-26123) in Microsoft Authenticator for iOS and Android could allow malicious apps on the same device to intercept one-time sign-in codes or authentication deep links. The flaw affects users relying on the app for multi-factor authentication (MFA), including those using BYOD (Bring Your Own Device) setups for corporate access.
How the Exploit Works
Microsoft Authenticator generates time-based one-time passwords (TOTP) and processes deep links specialized URIs that trigger app actions, such as logging into accounts. If a user installs a malicious app and accidentally selects it to handle an authentication link, the app could capture the one-time code or sign-in credentials, granting attackers access to the victim’s accounts.
A successful exploit could enable attackers to:
- Complete login flows for services trusting Microsoft Authenticator codes.
- Access sensitive data, including emails, files, cloud apps, or corporate systems.
- Pivot to additional accounts if they are also protected by Authenticator on the same device.
Mitigation & Updates
Microsoft has patched the vulnerability in current releases. Users should:
- Update Microsoft Authenticator via the App Store (iOS) or Google Play Store (Android).
- Avoid installing new apps that request handling of authentication links or QR-based sign-ins until the update is applied.
- Verify the app handling authentication requests ensuring it is Microsoft Authenticator or another trusted application.
- Use alternative MFA methods (e.g., password manager integrations or platform-specific solutions) if updates are delayed.
The flaw underscores the risks of malicious app interactions on mobile devices, particularly in BYOD environments where corporate and personal data intersect.
Microsoft Security cybersecurity rating report: https://www.rankiteo.com/company/microsoft-security
"id": "MIC1773318419",
"linkid": "microsoft-security",
"type": "Vulnerability",
"date": "3/2026",
"severity": "85",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'customers_affected': 'Users of Microsoft '
'Authenticator for MFA, '
'particularly in BYOD '
'environments',
'industry': 'Software, Cloud Services',
'location': 'Global',
'name': 'Microsoft',
'size': 'Enterprise',
'type': 'Technology Company'}],
'attack_vector': 'Malicious App Interaction',
'customer_advisories': 'Users advised to update Microsoft Authenticator and '
'verify authentication handlers',
'data_breach': {'data_exfiltration': 'Possible if malicious app captures and '
'transmits data',
'personally_identifiable_information': 'Potential (if linked '
'to user accounts)',
'sensitivity_of_data': 'High (MFA-protected accounts)',
'type_of_data_compromised': 'One-time passwords (TOTP), '
'authentication deep links, '
'sign-in credentials'},
'description': 'A critical vulnerability (CVE-2026-26123) in Microsoft '
'Authenticator for iOS and Android could allow malicious apps '
'on the same device to intercept one-time sign-in codes or '
'authentication deep links. The flaw affects users relying on '
'the app for multi-factor authentication (MFA), including '
'those using BYOD (Bring Your Own Device) setups for corporate '
'access.',
'impact': {'brand_reputation_impact': 'Risk of reputational damage due to MFA '
'bypass',
'data_compromised': 'One-time sign-in codes, authentication deep '
'links, sensitive data (emails, files, cloud '
'apps, corporate systems)',
'identity_theft_risk': 'High',
'operational_impact': 'Potential unauthorized access to corporate '
'and personal accounts',
'systems_affected': 'Microsoft Authenticator (iOS and Android)'},
'lessons_learned': 'Risks of malicious app interactions on mobile devices, '
'especially in BYOD environments; importance of verifying '
'app handlers for authentication requests',
'post_incident_analysis': {'corrective_actions': 'Patch released by '
'Microsoft; user education '
'on verifying app handlers',
'root_causes': 'Vulnerability in Microsoft '
'Authenticator allowing malicious '
'apps to intercept MFA codes or '
'deep links'},
'recommendations': ['Update Microsoft Authenticator to the latest version',
'Avoid installing new apps that request handling of '
'authentication links or QR-based sign-ins until the '
'update is applied',
'Verify the app handling authentication requests to '
'ensure it is trusted',
'Use alternative MFA methods if updates are delayed'],
'references': [{'source': 'Microsoft Security Advisory'}],
'response': {'communication_strategy': 'Advisory to users to update the app '
'and verify authentication handlers',
'containment_measures': 'Microsoft released a patch to fix the '
'vulnerability',
'remediation_measures': 'Users advised to update Microsoft '
'Authenticator via App Store or Google '
'Play Store'},
'title': 'Microsoft Authenticator Vulnerability Exposes MFA Codes to '
'Malicious Apps',
'type': 'Vulnerability Exploitation',
'vulnerability_exploited': 'CVE-2026-26123'}