Unveiling the Threat: CVE-2025-3928
If you use Commvault and M365, you'd better listen up.
A zero-day vulnerability in Commvault Metallic’s web server (CVE-2025-3928) allowed nation-state attackers to compromise Microsoft 365 client secrets, putting live customer data—not just backups—at risk. Here’s what went wrong, who’s affected, and the steps every IT and security leader must take right now..
The Deep Dive & CPE information.
CLAIM FREE CPE CREDITS BY READING THE DEEP DIVE
We get it—not everyone wants the super detailed nitty-gritty details. But we did the research, and it would be a shame to just let it rot in a file on our computers when it could just as easily rot here, where you can get the CPE credits for reading it. You know, if you’re into that kind of thing.
Expand the sections below to see the deep-dive content and for the pre-filled CPE submission info for CISSP, CISM, and CEH. You’re welcome. Tell your friends.
EXPAND THIS SECTION FOR THE DEEP DIVE
Advisory Analysis: Commvault Metallic M365 Client Secret Compromise via CVE-2025-3928
1. Executive Summary: The Commvault (Metallic) M365 Breach & CVE-2025-3928
A significant security incident has emerged involving Commvault’s Metallic Microsoft 365 (M365) backup Software-as-a-Service (SaaS) solution. Evidence suggests that a nation-state threat actor
Core Recommendations:
- Prioritize Patching: Immediately apply the patches released by Commvault to remediate CVE-2025-3928 on all affected Commvault Web Server instances.
- Rotate M365 Client Secrets: All Microsoft 365 application client secrets utilized by Commvault Metallic, particularly those active during the suspected compromise window, must be rotated without delay.
- Implement Conditional Access: Enforce stringent Conditional Access policies within Microsoft Entra ID, specifically targeting the service principals associated with Commvault Metallic, to restrict authentication pathways.
- Enhance M365 Monitoring: Augment logging capabilities within Microsoft 365 environments and conduct thorough threat hunting activities, focusing on anomalous behavior related to the Commvault Metallic application or its associated service principal.
A critical distinction must be understood and communicated to all stakeholders: the difference between the security of “backup data” and the implications of “M365 environment access.” While Commvault has asserted that “there has been no unauthorized access to customer backup data that Commvault stores and protects”
2. Understanding the Threat: CVE-2025-3928 and the Commvault Metallic Incident
A thorough understanding of the vulnerability itself and the timeline of the incident is crucial for effective response and mitigation.
Vulnerability Deep Dive (CVE-2025-3928)
-
Technical Nature: CVE-2025-3928 is described as an “unspecified vulnerability” within the Commvault Web Server.
Its exploitation allows a remote, authenticated attacker to create and execute webshells on the affected server.3 A webshell is a malicious script uploaded to a web server that provides the attacker with a persistent, remote interface to execute arbitrary commands and maintain control over the compromised system. This capability essentially hands over the server to the attacker, even if their initial authenticated access was with limited privileges.3 2 -
Affected Commvault Versions and Platforms: The vulnerability impacts several versions of the Commvault Web Server software across both Windows and Linux platforms.
Organizations must verify their deployments against the following list:3 - Versions 11.36.0 through 11.36.45 (Fixed in version 11.36.46)
- Versions 11.32.0 through 11.32.88 (Fixed in version 11.32.89)
- Versions 11.28.0 through 11.28.140 (Fixed in version 11.28.141)
- Versions 11.20.0 through 11.20.216 (Fixed in version 11.20.217)
-
CVSS Score and Severity: The severity of CVE-2025-3928 is underscored by its high CVSS scores:
- CVSS 3.1 Base Score: 8.8 (High).
The vector is .3 - Attack Vector: Network (AV:N): The vulnerability can be exploited remotely over a network.
- Attack Complexity: Low (AC:L): It is considered easy to exploit once the prerequisite of authentication is met.
- Privileges Required: Low (PR:L): The attacker does not need administrative privileges on the web server; any authenticated user account could potentially be used to exploit this flaw.
2 - User Interaction: None (UI:N): No interaction is required from any legitimate user for the vulnerability to be exploited.
- Scope: Unchanged (S:U): The exploit impacts the security scope of the vulnerable component (the web server) but does not directly affect other systems’ security scopes through its immediate exploitation.
- Confidentiality (C:H), Integrity (I:H), Availability (A:H): High: Successful exploitation can lead to a total loss of confidentiality, integrity, and availability of the Commvault Web Server.
- CVSS 4.0 Score (CISA): 8.7 (High).
The vector is . This newer scoring system also reflects the critical nature of the vulnerability.4
- CVSS 3.1 Base Score: 8.8 (High).
Incident Timeline & Scope
-
Discovery and Notification: The chain of events began on February 20, 2025, when Microsoft notified Commvault of suspicious activity, attributed to a nation-state threat actor, within Commvault’s Azure environment.
Commvault promptly initiated an investigation and released an initial security advisory.1 Further threat intelligence provided by Microsoft in April 2025 led to an updated advisory from Commvault.1 1 -
Public Disclosure and CISA KEV Addition: CVE-2025-3928 was officially added to CISA’s Known Exploited Vulnerabilities (KEV) Catalog on April 28, 2025.
This addition signifies that CISA has evidence of active exploitation in the wild. Federal agencies were given a deadline of May 17 or May 19, 2025, to apply mitigations or discontinue use of the product.3 The primary CISA advisory specifically linking this activity to the Commvault Metallic M365 client secret compromise was issued on May 22, 2025.4 5 -
Prevalence: The primary impact of this incident is on customers utilizing Commvault’s Metallic SaaS solution for M365 backup, which is hosted in Microsoft Azure.
Given that M365 backup is a fundamental security measure for any organization leveraging the Microsoft 365 suite, the potential reach of this vulnerability is extensive, cutting across multiple industries. Commvault supports a large global customer base, reportedly exceeding 100,000 organizations.5 While not all of these organizations will be using the Metallic M365 backup service, the strong adoption of Metallic, evidenced by its SaaS Annual Recurring Revenue (ARR) jumping 66% to $188 million2 , indicates a substantial number of potentially affected entities.10 -
Affected Customer Numbers: Commvault has stated that the breach directly affected “only a small number of customers”.
Similarly, the recommendation for customers to rotate their own application secrets was noted to apply to a “limited number of customers who themselves have control over Commvault’s application secrets”.2 However, precise figures or percentages regarding the number of impacted customers have not been publicly disclosed.5
The timeline of this incident reveals a noteworthy period between the initial detection of suspicious activity within Commvault’s environment in February and the broader public advisory concerning the M365 client secret compromise in May. While comprehensive investigations undoubtedly require time, this gap suggests a window during which threat actors might have continued their operations. Furthermore, the fact that CVE-2025-3928 was exploited as a zero-day
Table 1: CVE-2025-3928 Details
Feature | Description |
CVE ID | CVE-2025-3928 |
Description | Unspecified vulnerability in Commvault Web Server allowing a remote, authenticated attacker to create and execute webshells, leading to web server compromise. |
CVSS 3.1 Score/Vector | 8.8 (High) / |
CVSS 4.0 Score/Vector (CISA) | 8.7 (High) / |
Affected Commvault Versions | 11.36.0 – 11.36.45; 11.32.0 – 11.32.88; 11.28.0 – 11.28.140; 11.20.0 – 11.20.216 (Windows & Linux) |
Fixed Commvault Versions | 11.36.46; 11.32.89; 11.28.141; 11.20.217 (Windows & Linux) |
CISA KEV Catalog Added | April 28, 2025 |
KEV Due Date (Federal) | May 17/19, 2025 |
This table provides a concise summary critical for technical teams to quickly identify the vulnerability, assess its severity, and determine if their specific Commvault Web Server versions are affected, thereby streamlining remediation efforts. The KEV catalog information underscores the confirmed active exploitation and the urgency required in addressing this flaw.
3. Attack Vector Analysis: How Threat Actors Gained Access
Understanding the sequence of events and attacker methodologies is key to comprehending the full risk profile.
Initial Access & Exploitation (CVE-2025-3928)
-
Requirement for Authenticated Access: A crucial aspect of CVE-2025-3928 is that its exploitation requires the attacker to be authenticated to the Commvault Web Server.
This means the attacker must have already obtained valid user credentials for the system; the vulnerability itself does not provide this initial access. The attack also necessitates access to an internet-facing Commvault Web Server environment.3 6 -
Exploitation Mechanism: Once an attacker has authenticated with valid credentials (even those with low privileges
), they can leverage the unspecified flaw in the Commvault Web Server to upload and execute a webshell.2 This webshell then provides the attacker with persistent remote command execution capabilities on that specific server.3 -
Remote Exploitability: The vulnerability is confirmed to be remotely exploitable, as indicated by the “Network” (AV:N) component in its CVSS vector.
Risk Profile & Attack Scenarios
-
Realistic Scenario: Based on the available information, a plausible attack scenario unfolds as follows:
- Initial Foothold (Credential Acquisition): The threat actor first obtains valid user credentials for a Commvault Web Server account. The exact method used in this specific breach is not detailed, but common techniques include phishing, password spraying, or exploiting other unrelated vulnerabilities.
- Exploitation of CVE-2025-3928: The attacker uses the acquired credentials to log into a vulnerable, internet-facing Commvault Web Server. They then exploit CVE-2025-3928 to upload and execute a webshell.
- Post-Exploitation on Web Server: With an active webshell, the attacker gains control over the Commvault Web Server. From this compromised position, they can perform reconnaissance, escalate privileges if possible, and search for sensitive information stored or processed by this server or accessible from it.
- Access to M365 Client Secrets: The CISA alert
and Commvault’s own statements5 clearly indicate that this webshell access, or subsequent actions taken from the compromised server, led to the potential compromise of Microsoft 365 client secrets. These secrets are associated with the Commvault Metallic SaaS application used for M365 backup. While the precise mechanism of how webshell access on a Commvault Web Server translated to the theft of M365 client secrets stored within Commvault’s Azure-hosted infrastructure is not explicitly detailed in the provided information, this step is the critical link in the attack chain. It is conceivable that these secrets were stored in configuration files, databases, or other repositories accessible from the compromised components of Commvault’s cloud environment.1 - Customer M365 Environment Compromise: With the M365 client secrets in hand, the attackers can then authenticate to the respective customers’ M365 environments, impersonating the Commvault Metallic application.
5
-
Role of Phishing, Social Engineering, Insider Threats for Initial Authentication: While the specific method for obtaining initial credentials for the Commvault Web Server in this incident remains undisclosed, nation-state actors frequently employ sophisticated tactics such as spear-phishing campaigns, social engineering, or leveraging previously compromised credentials from other breaches.
Techniques like password spraying against exposed login portals are also common for gaining initial access to cloud services.11 An insider threat, although less commonly attributed in such advisories, also remains a theoretical possibility for initial credential compromise.13
The “authenticated” prerequisite for exploiting CVE-2025-3928 is a pivotal detail. It implies that the zero-day vulnerability was likely one component in a more intricate, multi-stage attack orchestrated by the nation-state actor. The attackers needed to overcome the initial authentication barrier before they could leverage CVE-2025-3928. This could have involved exploiting an entirely different vulnerability, a successful phishing campaign targeting Commvault personnel or systems, or the exploitation of misconfigured or weakly secured Commvault web server instances exposed to the internet. The CISA alert’s mention of a potential “larger campaign targeting various SaaS companies’ cloud applications with default configurations and elevated permissions”
Exploitability & Attack Chain
-
From Webshell to Client Secret Theft: The pivotal phase of the attack, following the successful deployment of a webshell on a Commvault Web Server, involved the attackers navigating within Commvault’s Azure-hosted infrastructure to locate and exfiltrate the M365 client secrets for the Metallic service. This likely entailed further reconnaissance to identify where these sensitive credentials were stored or managed, and then leveraging their compromised position to access them.
-
Path to M365 Environment Compromise: Once an M365 client secret is stolen, an attacker can use it to request OAuth access tokens for the Microsoft Graph API or other M365 service APIs, effectively acting as the Commvault Metallic application.
This grants them the permissions that have been assigned to that specific application’s service principal within the customer’s M365 tenant. These permissions could potentially include read/write access to emails in Exchange Online, files in OneDrive for Business and SharePoint Online, and data within Microsoft Teams.5 -
Potential for Deeper Infiltration:
- Privilege Escalation: If the compromised Commvault Metallic application service principal within a customer’s M365 tenant has been granted excessive permissions (more than what is strictly necessary for its backup function), this could represent a form of privilege escalation for the attacker within that customer’s M365 environment.
- Lateral Movement: Access to one M365 service (e.g., SharePoint) could be leveraged to access others, or compromised mailboxes could be used to send highly convincing internal phishing emails to further compromise user accounts or spread malware.
- Persistence: The stolen application client secrets themselves offer a durable form of persistence until they are rotated and revoked. Attackers might also attempt to establish additional persistence mechanisms within the compromised M365 environment, such as creating new admin accounts or registering their own malicious applications.
-
Known PoCs or Weaponized Exploits: The inclusion of CVE-2025-3928 in CISA’s KEV catalog
serves as definitive proof that it has been actively exploited in real-world attacks. The Commvault incident itself, where the vulnerability was used as a zero-day3 , is a clear demonstration of its weaponization by sophisticated threat actors.2
This incident highlights a concerning trend where attackers target the administrative or management infrastructure of an organization or its service providers—such as backup solutions—not solely for the data these systems might directly contain, but as a strategic pivot point to gain access to broader, often more valuable, cloud ecosystems like Microsoft 365. Backup systems, by their very nature, often require privileged access to the production systems they are designed to protect. If these backup systems or their management interfaces are compromised, that privileged access can be subverted by attackers, turning a defensive tool into an offensive vector.
MITRE ATT&CK Framework Mapping
Mapping the observed and inferred behaviors to the MITRE ATT&CK framework provides a standardized way to describe the attack and understand the tactics, techniques, and procedures (TTPs) involved.
-
Initial Access (Hypothesized for Commvault Web Server):
- T1078 (Valid Accounts): If attackers used stolen or reused legitimate credentials.
- T1110.003 (Brute Force: Password Spraying): A common technique for obtaining credentials for cloud-based services by trying a few common passwords against many accounts.
13 - T1566 (Phishing): Could have been used to steal initial credentials from Commvault personnel or users with access to the web server.
-
Execution (on Commvault Web Server):
- T1505.003 (Server Software Component: Web Shell): This directly describes the core exploitation of CVE-2025-3928, where attackers deployed webshells after authenticating to the Commvault Web Server.
3
- T1505.003 (Server Software Component: Web Shell): This directly describes the core exploitation of CVE-2025-3928, where attackers deployed webshells after authenticating to the Commvault Web Server.
-
Credential Access (within Commvault’s environment leading to M365 client secrets):
- The exact TTP is not specified in the available information. However, once the web server was compromised via the webshell, attackers could have used various techniques such as:
- Searching for credentials in configuration files or scripts.
- Accessing internal databases or secret management systems accessible from the compromised server.
- The exact TTP is not specified in the available information. However, once the web server was compromised via the webshell, attackers could have used various techniques such as:
-
Impact & Subsequent Access (to Customer M365 Environments):
- T1078.004 (Valid Accounts: Cloud Accounts): The compromised M365 application, using the stolen client secrets, acts as a legitimate, authenticated cloud account within the customer’s M365 tenant.
15 - T1528 (Steal Application Access Token): While client secrets are not access tokens themselves, their compromise directly enables an attacker to obtain OAuth access tokens for the M365 APIs by impersonating the legitimate application.
This technique is highly relevant to the core impact of the client secret theft.17 - T1671 (Cloud Administration Command): If attackers, after gaining initial access via the compromised application, were able to further manipulate application registrations or grant new OAuth consents within the customer’s M365 environment (though less directly indicated here, it’s a related cloud TTP
).19
- T1078.004 (Valid Accounts: Cloud Accounts): The compromised M365 application, using the stolen client secrets, acts as a legitimate, authenticated cloud account within the customer’s M365 tenant.
Table 2: MITRE ATT&CK Techniques Relevant to the Commvault Incident
Tactic | Technique ID & Name | Description of Relevance to Commvault/Metallic Incident |
Initial Access | T1078 (Valid Accounts) | Attackers likely obtained legitimate credentials for the Commvault Web Server through prior activities (phishing, previous compromise, etc.) as CVE-2025-3928 requires authentication. |
Initial Access | T1110.003 (Password Spraying) | A possible method for attackers to obtain initial credentials for the Commvault Web Server by targeting multiple accounts with common passwords. |
Execution | T1505.003 (Server Software Component: Web Shell) | Core exploitation of CVE-2025-3928 involved attackers deploying webshells on the Commvault Web Server after successful authentication. |
Credential Access | (Various, e.g., from files, memory, or internal systems) | After webshell deployment, attackers likely sought and exfiltrated M365 client secrets from within Commvault’s Azure environment. Specific TTPs for this internal step are not detailed. |
Credential Access | T1528 (Steal Application Access Token) | The stolen M365 client secrets allow attackers to request and obtain OAuth access tokens, effectively hijacking the application’s identity and access to customer M365 data. |
Impact / Access | T1078.004 (Valid Accounts: Cloud Accounts) | The compromised Commvault Metallic application, using stolen client secrets, authenticates as a valid (albeit unauthorized) application/service principal within the customer’s M365 environment. |
This mapping to MITRE ATT&CK provides a standardized lexicon for discussing the attacker’s actions, aiding organizations in assessing their defensive posture against these specific behaviors and prioritizing security improvements.
4. Real-World Impact & Urgency
The implications of this security event are significant, underscored by several key factors.
-
Active Exploitation in the Wild: The most pressing concern is the confirmed active exploitation of CVE-2025-3928. Its inclusion in CISA’s KEV catalog on April 28, 2025
, is a direct confirmation that threat actors were already leveraging this vulnerability in real-world attacks. The fact that it was exploited as a zero-day in the Commvault incident3 means attackers had weaponized it before a patch was available or the vulnerability was publicly known, giving them a considerable advantage.2 -
Nation-State Actor Attribution: Both Commvault and Microsoft have attributed the unauthorized activity to a nation-state threat actor.
This attribution carries significant weight, suggesting attackers with sophisticated capabilities, substantial resources, and likely strategic, long-term objectives rather than immediate financial gain.1 Nation-state operations often focus on espionage, intellectual property theft, establishing persistent access for future operations, or disruption.12 -
Patch Adoption Status: While Commvault has released patches to address CVE-2025-3928
, the speed and completeness of patch adoption across all vulnerable customer environments remain unknown. CISA’s Binding Operational Directive 22-01, which mandates federal agencies to remediate KEV-listed vulnerabilities by specified deadlines (mid-May 2025 in this case3 ), highlights the urgency. The subsequent CISA advisory on May 22, 2025, regarding the Metallic client secret compromise further emphasizes the need for prompt action by all affected organizations.2 5 -
High-Profile Incident: This breach affecting Commvault and its Metallic M365 backup service constitutes a high-profile security incident. This is due to the confluence of factors: the involvement of a major, publicly-listed data protection vendor
; the targeting of a widely adopted SaaS backup solution for the ubiquitous Microsoft 365 platform; the attribution to a nation-state actor; and the prominent alerts and KEV catalog inclusion by CISA.2 -
Potential Broader Campaign: CISA has indicated a belief that this threat activity “may be part of a larger campaign targeting various SaaS companies’ cloud applications with default configurations and elevated permissions”.
This raises the alarming prospect that the Commvault incident might not be an isolated event but rather one facet of a more extensive operation by sophisticated actors aimed at compromising SaaS providers and their customers.5
The involvement of a nation-state actor exploiting a zero-day vulnerability against a security vendor’s own infrastructure, with the ultimate goal of accessing that vendor’s customers’ cloud environments, represents a sophisticated and concerning evolution of supply chain attacks. It underscores the immense trust organizations place in their SaaS providers and the potentially cascading impact when that trust is compromised. The vendor, in this case Commvault, became an unwilling conduit for attackers to reach their end targets—the customers’ M365 tenants.
This incident serves as a stark reminder that even with robust internal security measures, reliance on third-party SaaS providers inherently introduces shared risks. The security of an organization’s Microsoft 365 environment is not solely dependent on its own configurations and controls but is also intertwined with the security posture of critical integrated services like Commvault Metallic. This situation powerfully emphasizes the necessity for rigorous and ongoing vendor due diligence, a clear and practical understanding of shared responsibility models in the cloud, and proactive measures to limit the potential blast radius should a third-party provider be breached.
5. Sector-Specific Risk Analysis & Recommendations
The compromise of M365 client secrets via a trusted backup provider like Commvault Metallic poses distinct and severe risks to various sectors, particularly Higher Education and Healthcare, due to the nature of the data they handle and their common IT operational characteristics.
Higher Education Institutions
-
Typical IT Stack Vulnerabilities:
- Heavy M365 Reliance: Universities and colleges extensively use Microsoft 365 for student and faculty email, collaborative research, file storage (OneDrive, SharePoint), and administrative functions.
- Diverse and Transient User Base: Managing security for a large, diverse population of students, faculty, researchers, staff, and alumni, many of whom may have varying levels of security awareness and may use personal devices, presents significant challenges.
- Complex Hybrid Environments: Many institutions operate a mix of modern cloud services alongside legacy on-premise systems, creating complex identity and access management scenarios.
- Budgetary and Resource Constraints: Public and private educational institutions can face budget limitations that impact their ability to rapidly implement the latest security technologies or maintain large, specialized cybersecurity teams.
- Open Collaboration Culture: The need for open collaboration in research and academic pursuits can sometimes conflict with stringent security controls.
-
Specific Risks from this Incident:
- Compromise of Sensitive Research Data: Microsoft 365 environments in higher education often store vast amounts of valuable research data, including pre-publication findings, proprietary algorithms, and intellectual property. Unauthorized access via compromised Metallic client secrets could lead to intellectual property theft, undermining research integrity and competitiveness.
20 - Exposure of Student and Faculty Personally Identifiable Information (PII): M365 tenants hold significant PII for students, faculty, and staff (e.g., names, addresses, social security numbers, academic records). A breach could lead to identity theft, financial fraud, and severe reputational damage to the institution.
- Disruption of Academic and Administrative Operations: Compromise of M365 could cripple email communication, access to course materials on SharePoint or Teams, online learning platforms, and critical administrative workflows, leading to widespread disruption.
- Erosion of Trust: A significant data breach can erode the trust of students, faculty, alumni, and funding bodies.
- Compromise of Sensitive Research Data: Microsoft 365 environments in higher education often store vast amounts of valuable research data, including pre-publication findings, proprietary algorithms, and intellectual property. Unauthorized access via compromised Metallic client secrets could lead to intellectual property theft, undermining research integrity and competitiveness.
-
Tailored Preparation and Defense Strategies for Higher Education:
- Aggressively Implement M365 Security Best Practices: Prioritize the adoption of CISA’s Secure Cloud Business Applications (SCuBA) project guidance for M365
and Microsoft’s Zero Trust deployment plan.5 21 - Enforce Granular Permissions for M365 Applications: Scrutinize and rigorously apply the principle of least privilege to all third-party applications integrated with M365, including backup solutions like Metallic.
Regularly audit Entra ID application registrations and service principal permissions.1 - Enhance M365 Logging and Active Monitoring: Ensure comprehensive logging is enabled for M365 services (Unified Audit Log, Entra ID sign-in and audit logs
) and actively monitor for anomalous application behavior, suspicious sign-ins, or unusual data access patterns related to integrated applications.5 - Data Classification and Protection: Implement robust data classification schemes to identify sensitive research data and PII within M365. Apply appropriate protection measures, such as Microsoft Purview Information Protection (sensitivity labels, encryption), to this data.
- Refine Incident Response Plans: Ensure incident response plans specifically address scenarios involving SaaS provider breaches and the compromise of M365 application credentials. Test these plans regularly.
- Targeted User Training and Awareness: Conduct ongoing security awareness training focused on phishing, credential hygiene, recognizing compromised account behavior, and secure collaboration practices within M365.
- Strengthen Vendor Risk Management: For institutions that manage their own application secrets for services like Metallic, ensure robust secret management practices, including secure storage and frequent rotation.
For all third-party SaaS integrations, perform thorough security due diligence.5
- Aggressively Implement M365 Security Best Practices: Prioritize the adoption of CISA’s Secure Cloud Business Applications (SCuBA) project guidance for M365
Healthcare Organizations
-
Typical IT Stack Vulnerabilities:
- Growing M365 Adoption for ePHI: Healthcare providers are increasingly using M365 for clinical communication, collaboration, and administrative tasks, often involving electronic Protected Health Information (ePHI).
- Internet of Medical Things (IoMT): The proliferation of connected medical devices can expand the attack surface if these devices are not properly secured and segmented from primary networks.
- Legacy Clinical Systems: Many healthcare organizations rely on legacy clinical applications that may be difficult to patch, secure, or integrate safely with modern cloud platforms.
- Stringent Regulatory Compliance (HIPAA/HITECH): Healthcare is subject to strict data protection regulations, with significant penalties for non-compliance and breaches involving ePHI.
- High-Pressure Environment: The fast-paced, critical nature of healthcare can sometimes lead to security shortcuts if controls are perceived as impeding patient care.
-
Specific Risks from this Incident:
- ePHI Breach and HIPAA Violations: The most significant risk is the unauthorized access to ePHI stored or communicated via M365 (emails, files in OneDrive/SharePoint, Teams messages). Such a breach would constitute a serious violation of the HIPAA Security and Privacy Rules, leading to mandatory breach notifications, substantial financial penalties, corrective action plans, and severe reputational harm.
22 - Impact on Patient Care and Safety: Disruption to M365 services could critically affect clinical communication (e.g., between doctors, nurses, and specialists), access to patient information necessary for treatment decisions, and scheduling systems, potentially leading to delays in care or medical errors.
- Operational Disruption: Healthcare operations are heavily dependent on the timely and secure flow of information. An M365 compromise could cripple administrative functions, billing, and clinical workflows, leading to significant operational disruption.
- Compromise of Medical Research Data: Similar to higher education, many healthcare organizations conduct clinical trials and medical research. Unauthorized access to this data via M365 could lead to loss of valuable intellectual property.
- ePHI Breach and HIPAA Violations: The most significant risk is the unauthorized access to ePHI stored or communicated via M365 (emails, files in OneDrive/SharePoint, Teams messages). Such a breach would constitute a serious violation of the HIPAA Security and Privacy Rules, leading to mandatory breach notifications, substantial financial penalties, corrective action plans, and severe reputational harm.
-
Tailored Preparation and Defense Strategies for Healthcare:
- Strict Adherence to HIPAA Security Rule: All M365 configurations and third-party application integrations (such as Commvault Metallic) must be meticulously aligned with HIPAA’s technical, administrative, and physical safeguards.
This includes robust access controls, audit controls, data integrity mechanisms, and transmission security.22 - Implement a Zero Trust Architecture: Adopt Zero Trust principles (“never trust, always verify”) for all access to M365 and any systems containing ePHI.
This involves explicit verification for every access request, use of least privilege, and assuming breach.21 - Robust Business Associate Agreements (BAAs): Ensure comprehensive and legally sound BAAs are in place with all vendors (including Commvault/Metallic) that create, receive, maintain, or transmit ePHI on behalf of the covered entity. These BAAs must clearly define roles, responsibilities, and liability in the event of a security incident or breach.
- Utilize M365 Data Loss Prevention (DLP): Configure and maintain M365 DLP policies to automatically detect, alert on, and prevent the unauthorized exfiltration or inappropriate sharing of ePHI.
- Resilient and Verifiable Data Protection Strategy: While Metallic provides M365 backup, healthcare organizations must consider the implications if the live M365 environment is compromised. Ensure an overall data protection strategy that includes secure, potentially immutable, and regularly tested backups, with clear recovery time objectives (RTOs) and recovery point objectives (RPOs).
- Conduct Regular and Thorough Risk Assessments: Perform periodic risk assessments that specifically focus on M365 security, third-party vendor integrations, and compliance with HIPAA requirements.
- Well-Rehearsed Incident Response & Breach Notification Procedures: Maintain and regularly test an incident response plan that includes specific procedures for handling ePHI breaches, including timely notification to affected individuals, the Secretary of Health and Human Services (HHS), and potentially the media, as mandated by the HIPAA Breach Notification Rule.
22 - Secure Endpoints Accessing M365: Implement strong endpoint security controls (EDR, patching, configuration management) on all devices (including personal devices under BYOD policies and medical devices, if applicable) that access M365 to prevent them from becoming entry points for attackers.
- Strict Adherence to HIPAA Security Rule: All M365 configurations and third-party application integrations (such as Commvault Metallic) must be meticulously aligned with HIPAA’s technical, administrative, and physical safeguards.
Both the higher education and healthcare sectors manage highly sensitive and valuable data—research intellectual property, extensive PII, and critical ePHI. Their increasing reliance on large, interconnected SaaS ecosystems like Microsoft 365, while offering significant productivity and collaboration benefits, also concentrates risk. An incident like the Commvault Metallic breach, where a vulnerability in a third-party backup solution provider’s infrastructure can directly threaten the primary M365 data environment of its customers
This situation should compel organizations in these sectors to critically re-evaluate how they manage third-party application permissions within their M365 tenants. The ease of SaaS integrations and the desire for enhanced functionality must be carefully weighed against the potential risks of granting overly permissive access or suffering from compromised vendor credentials. A passive “default allow” or a “set it and forget it” mentality towards M365 application integrations is a dangerous posture in the current threat landscape. Instead, a proactive, continuous lifecycle management approach for application permissions and credentials is required.
6. Comprehensive Mitigation and Detection Strategies
A multi-faceted approach is essential to address the risks posed by CVE-2025-3928 and the potential compromise of Commvault Metallic M365 client secrets.
Immediate Actions (Patching & Credentials)
-
Apply Commvault Patches for CVE-2025-3928: This is the foundational and most critical step. Organizations must update their Commvault Web Server installations to the fixed versions: 11.36.46, 11.32.89, 11.28.141, or 11.20.217, as applicable.
This action directly addresses the root vulnerability on the web server, preventing its future exploitation.3 -
Rotate Microsoft 365 Application Client Secrets: For all Commvault Metallic applications and their associated service principals within Microsoft Entra ID, client secrets must be rotated immediately.
This is particularly urgent for any secrets that were active or created between February and May 2025, the period during which the compromise may have occurred. Rotating these secrets invalidates any previously compromised credentials.1 - It is important to note CISA’s clarification that for some customers, Commvault manages these secrets and is undertaking the rotation.
However, for a “limited number of customers who themselves have control over Commvault’s application secrets”1 , the responsibility for rotation lies with the customer. Organizations must clearly identify their specific scenario and act accordingly.5
- It is important to note CISA’s clarification that for some customers, Commvault manages these secrets and is undertaking the rotation.
-
Establish Regular Credential Rotation Policies: Implement and enforce a policy for the regular rotation of all M365 application client secrets, including those used by Commvault Metallic and other third-party integrations. A rotation frequency of every 30 to 90 days is a recommended best practice.
2
Technical Controls
-
Implement Conditional Access Policies for Service Principals (Workload Identities):
- A key defensive measure is to configure Conditional Access policies in Microsoft Entra ID to restrict how and from where application service principals (also known as workload identities), such as the one used by Commvault Metallic, can authenticate.
Specifically, limit authentication to approved IP address ranges. If Commvault provides a list of their service egress IP addresses, these should be used to create a “named location” in Entra ID, and the Conditional Access policy should be configured to only allow authentication from this trusted location.2 This can significantly mitigate the risk of compromised secrets being used from attacker-controlled infrastructure.5 - Implementing Conditional Access for workload identities typically requires Azure AD Premium P1 or P2 licenses and involves careful configuration of policies that target these non-human identities.
25
- A key defensive measure is to configure Conditional Access policies in Microsoft Entra ID to restrict how and from where application service principals (also known as workload identities), such as the one used by Commvault Metallic, can authenticate.
-
Deploy a Web Application Firewall (WAF): Place a WAF in front of Commvault management interfaces, including the Web Server.
A well-configured WAF can help detect and block malicious web traffic, including attempts to exploit web vulnerabilities, upload webshells, or perform path-traversal attacks.5 -
Restrict Network Access to Commvault Management Interfaces: Wherever feasible, limit network access to Commvault management interfaces to trusted internal networks and designated administrative systems only.
Reducing the internet-exposed attack surface of these critical systems can prevent attackers from reaching them in the first place.5
Monitoring & Detection
-
Thorough Review of Microsoft 365 / Entra ID Logs: Conduct comprehensive reviews of Microsoft Entra ID audit logs, Entra ID sign-in logs, and the Microsoft 365 Unified Audit Log (UAL).
Focus on activity related to Commvault service principals or any M365 applications used for backup. Look for:1 - Anomalous sign-in attempts (unusual geographic locations, IP addresses not matching Commvault’s known ranges, unexpected frequency, suspicious user agents).
- Unexpected permission grants, modifications to application registrations, or consent grants.
- Suspicious data access patterns (e.g., large volume downloads, access to unusual mailboxes or sites) by the application.
- Commvault has stated they are providing Indicators of Compromise (IOCs) to assist customers with these investigations.
These IOCs should be actively used in threat hunting.1
-
Monitor Commvault Web Server Logs: Scrutinize logs on Commvault Web Servers, paying close attention to activity in unexpected directories, especially web-accessible paths.
Look for evidence of suspicious file uploads, modifications, or execution that could indicate webshell activity.5 -
Intrusion Detection/Prevention System (IDS/IPS) Rules: Implement or update IDS/IPS signatures to detect known webshell traffic patterns and exploitation attempts targeting Commvault systems.
-
Endpoint Detection and Response (EDR) on Commvault Servers: Ensure robust EDR capabilities are deployed and active on all Commvault servers. EDR can help detect malicious processes, file modifications, or network connections resulting from webshell execution or other post-exploitation activities.
Proactive Measures & Best Practices
-
Enforce the Principle of Least Privilege:
- Rigorously review and revalidate the permissions granted to all application registrations and service principals in Microsoft Entra ID that are used by Commvault Metallic (and other third-party applications).
Ensure these applications only possess the absolute minimum set of permissions required for their legitimate functions. Remove any excessive, unused, or overly broad permissions.1 - Avoid granting broad administrative consent to applications unless there is a clear, documented, and thoroughly vetted business need.
- Rigorously review and revalidate the permissions granted to all application registrations and service principals in Microsoft Entra ID that are used by Commvault Metallic (and other third-party applications).
-
Implement CISA’s SCuBA Project Recommendations: Adopt and implement the general M365 security recommendations outlined in CISA’s Secure Cloud Business Applications (SCuBA) Project.
This initiative provides valuable, actionable guidance for hardening M365 tenants against a variety of threats.5 -
Secure Management of Application Secrets: For any application secrets that are managed by the customer (rather than the SaaS vendor), ensure they are stored securely, for example, in a dedicated secrets management solution like Azure Key Vault. Avoid hardcoding secrets in scripts, configuration files, or source code.
26 -
Ongoing User Training and Awareness: While this specific incident involves a server-side exploit, a well-informed user base is a critical layer of defense. Continue regular user training on phishing awareness, strong credential hygiene, and how to recognize and report signs of M365 account compromise.
-
Update Incident Response Plans: Review and update the organization’s incident response plan to explicitly include scenarios involving breaches at SaaS providers and the compromise of cloud application credentials. Ensure clear procedures for containment, eradication, recovery, and communication.
The array of recommended mitigations underscores the necessity of a defense-in-depth strategy. Patching the specific CVE is a crucial reactive measure to close the known entry point. Rotating potentially compromised secrets addresses the immediate fallout. However, proactive and preventative measures like implementing Conditional Access policies for service principals, deploying WAFs, restricting network access, and consistently applying the principle of least privilege are essential for reducing the likelihood and impact of future, similar attacks. No single control can be a panacea; resilience is built through multiple, overlapping layers of security.
This incident, and the subsequent guidance from CISA and Commvault, is also indicative of a broader maturation in cloud security thinking, particularly concerning the identity and access management of non-human identities like service principals and workload identities. The strong emphasis on leveraging Conditional Access policies for service principals
Table 3: Prioritized Mitigation Checklist for CVE-2025-3928 & Metallic M365 Secret Compromise
Mitigation Action | Detailed Description/Steps | Priority | Responsibility |
Patch Commvault Web Server (CVE-2025-3928) | Apply official Commvault patches to update Web Server to versions 11.36.46, 11.32.89, 11.28.141, or 11.20.217. |
High | Server Administrators, Commvault Administrators |
Rotate M365 Application Secrets (Commvault Metallic) | Identify all service principals used by Commvault Metallic for M365 backup. Generate new client secrets in Entra ID and update them in the Commvault configuration. Revoke old secrets. Confirm if Commvault or customer is responsible. |
High | M365 Administrators, Security Team |
Review M365/Entra ID Logs for Compromise | Analyze Entra ID sign-in/audit logs and M365 UAL for anomalous activity related to Commvault service principals, using Commvault-provided IOCs. Focus on Feb-May 2025 timeframe initially. |
High | Security Operations Center (SOC), IR Team |
Implement Conditional Access for Service Principals | Configure Entra ID Conditional Access policies to restrict Commvault Metallic service principal authentication to known/trusted IP ranges (e.g., Commvault’s allowlist). |
High | M365 Administrators, Identity Management Team |
Review & Enforce Least Privilege for M365 Apps | Audit permissions of Commvault Metallic service principal (and other M365 apps). Remove any permissions not strictly required for functionality. |
Medium | M365 Administrators, Security Team |
Deploy/Configure WAF for Commvault Interfaces | If not already in place, deploy a Web Application Firewall in front of Commvault management web interfaces. Configure rules to block common web attacks. |
Medium | Network Security Team, Server Administrators |
Restrict Network Access to Management Interfaces | Limit direct internet exposure of Commvault management interfaces. If possible, restrict access to internal trusted networks or via VPN. |
Medium | Network Team, Server Administrators |
Establish Regular M365 Secret Rotation Policy | Define and implement a policy for rotating M365 application client secrets at least every 30-90 days. |
Medium | Security Policy Team, M365 Administrators |
Monitor Commvault Web Server Logs | Implement enhanced monitoring of Commvault Web Server logs, focusing on web-accessible paths for suspicious file activity or unexpected directory access. |
Medium | SOC, Server Administrators |
This checklist provides a structured path for organizations to address the immediate threats and implement longer-term improvements to their security posture in light of this incident.
7. Key Takeaways & Actionable Recommendations for Briefings
Communicating the nuances of this incident effectively to both technical teams and leadership is paramount.
-
Concise Summary of Threat & Implications (for non-technical leadership):
- “A critical security flaw, identified as CVE-2025-3928, in our Commvault backup software was actively exploited by highly sophisticated attackers, believed to be nation-state actors. This exploitation allowed them to potentially access credentials that our Commvault Metallic service uses to connect to our Microsoft 365 environment. While Commvault reports that our backed-up data itself was not breached by them, the stolen M365 credentials could grant attackers unauthorized access to our live Microsoft 365 services, including emails, shared files, and collaborative platforms. This is a serious incident that requires immediate and ongoing attention.”
- “This attack utilized a ‘zero-day’ vulnerability, meaning the attackers exploited it before a fix was publicly known or available. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has confirmed this vulnerability is being actively exploited in the wild, underscoring the urgency.”
-
Prioritized List of Actions for Security Teams:
- Immediate Response: The absolute top priorities are to patch all vulnerable Commvault Web Server instances to remediate CVE-2025-3928 and to rotate all Microsoft 365 application client secrets associated with Commvault Metallic. Concurrently, an intensive review of Microsoft 365 and Entra ID logs must be initiated, leveraging any Indicators of Compromise (IOCs) provided by Commvault, to search for evidence of unauthorized access or anomalous activity.
- Short-Term Hardening: Swiftly implement IP-based Conditional Access policies in Microsoft Entra ID to restrict where the Commvault M365 service principal can authenticate from. Conduct a thorough review of all permissions granted to M365 applications, particularly Commvault Metallic, and enforce the principle of least privilege, revoking any unnecessary access. If not already in place, deploy and configure a Web Application Firewall (WAF) to protect Commvault management interfaces.
- Ongoing Vigilance: Establish and maintain a policy for the regular rotation of all M365 application credentials. Continuously monitor M365 and Commvault server logs for suspicious activities. Stay abreast of emerging threats and advisories from CISA and software vendors, ensuring timely application of future patches and security updates.
-
Communication Points for Leadership:
- Quantifiable Risk: Clearly articulate the potential business impact: unauthorized access to sensitive corporate data, customer information, or intellectual property stored in M365; potential for operational disruption if M365 services are maliciously manipulated; significant reputational damage if a breach is confirmed and becomes public; and potential regulatory fines or legal action, especially for organizations in sectors like Healthcare (HIPAA) or those handling PII in Higher Education.
- Coordinated Response: Outline the concrete steps already taken (e.g., patching, secret rotation, initiation of forensic investigation) and the planned security enhancements to provide assurance that the incident is being managed effectively.
- Resource Allocation: If the incident response or subsequent hardening efforts require additional tools, specialized personnel, or budget, this is the time to articulate those needs clearly, linking them directly to risk reduction.
- Third-Party Vendor Risk Management: Emphasize that this incident underscores the inherent risks associated with third-party SaaS providers. Propose a review and strengthening of the organization’s vendor risk management program, particularly for critical services that integrate deeply with core platforms like M365.
- Broader Threat Landscape: Inform leadership that CISA suspects this may be part of a wider campaign targeting SaaS providers.
This context reinforces the need for sustained vigilance and proactive security investments, as this is not an isolated threat.5
When briefing leadership and stakeholders, it’s essential to strike a balance between conveying the genuine urgency and seriousness of the situation and presenting a clear, calm, and actionable plan. Over-sensationalizing the threat can lead to unproductive panic, while downplaying it can result in insufficient support for necessary actions. The core message should revolve around the potential compromise of the live M365 environment stemming from a breach at a trusted third-party vendor, and the decisive steps being taken to mitigate this risk.
This incident should serve as a potent catalyst within organizations to champion and reinforce the importance of adopting a Zero Trust security mindset. The traditional perimeter-based security model is insufficient when critical data and services reside in the cloud and are accessed via a complex web of first-party and third-party applications. The Commvault/Metallic breach is a practical, real-world illustration of the core Zero Trust tenets: “assume breach” (a trusted vendor was compromised) and “verify explicitly” (all access, including by applications, must be continuously validated and restricted). Using this event as a case study can make abstract security concepts like Zero Trust more tangible and compelling, thereby facilitating the necessary cultural shifts and securing the commitment required to implement robust, modern security controls across the enterprise.
We warned you it was deep. You arent earning those CPE credits for nothing!
EXPAND THIS SECTION FOR CPE SUBMISSION DETAILS
Continuing Professional Education (CPE) Credit
Earn CPE credits for reading this Security Blotter article. All Security Blotter articles that come with a Deep Dive section are eligible to earn free CPEs for you, the reader. Our articles include all issues, incidents, and bulletins to relevant Infosec standards and best practices. We have documented your CPE submission below for your convenience and because we love you (in a platonic way).
Continuing Professional Education (CPE) Credit
Earn CPE credits for reading this Security Blotter article. This piece provides practical and technical insight into zero-day vulnerabilities, privilege escalation, and remote code execution threats targeting cloud backup, privilege management, and Microsoft 365 environments. It is suitable for professionals maintaining credentials in cybersecurity, risk management, and incident response.
Article Overview
This article provides an in-depth analysis of the Commvault Metallic CVE-2025-3928 breach, the compromise of Microsoft 365 client secrets, attacker tradecraft, sector-specific mitigation guidance, and response actions. The content aligns with core topics across security operations, incident response, governance, and cloud security domains.
- Word Count: 8,177
- URL: https://securityblotter.com/urgent-commvault-alert-cve-2025-3928-enables-m365-tenant-compromise
- Estimated Read Time: 41 minutes
- CPE Total: 0.75 CPE credits
- Publisher: Security Blotter
- Author: Jonathan Brennan – ISC2 Member ID 555001
📋 CPE Submission Details
Certification | CPEs Earned | Domains Covered | Reporting URL | Description |
---|---|---|---|---|
CISSP (ISC2) | 0.75 | Domain 1 (Security & Risk Management), Domain 6 (Security Assessment and Testing), Domain 7 (Security Operations) |
https://cpe.isc2.org | Urgent Commvault Alert: CVE-2025-3928 Enables M365 Tenant Compromise |
CISM (ISACA) | 0.75 | Domain 1 (Information Security Governance), Domain 2 (Information Risk Management) |
https://www.isaca.org | Urgent Commvault Alert: CVE-2025-3928 Enables M365 Tenant Compromise |
CEH (EC-Council) | 0.75 | Domain 2 (Information Security Threats and Attack Vectors), Domain 3 (Security Controls and Defense Mechanisms) |
https://www.eccouncil.org | Urgent Commvault Alert: CVE-2025-3928 Enables M365 Tenant Compromise |
📝 Additional Notes
- Other Certifications: This article may qualify for CPE credit with other certifications that recognize professional security education, including CompTIA Security+, GIAC, and vendor-specific programs.
- Disclaimer: Certification holders are responsible for confirming eligibility with their respective certifying bodies. Security Blotter is not affiliated with ISC2, ISACA, EC-Council, or any certification organization and cannot assist with audit documentation or CPE disputes.
- Record Keeping: Save a local copy or PDF of this article, along with your notes or reflections, in case of a future CPE audit.
- Content Removal Notice: Security Blotter reserves the right to update or remove articles at any time.
The Breach That Broke the Model: Commvault Metallic’s M365 Client Secret Crisis
In a year already thick with cloud security incidents, the Commvault Metallic Microsoft 365 (M365) backup breach is one that every security leader should study closely. What started as a technical exploit (CVE-2025-3928) snowballed into a genuine supply-chain attack—one where attackers didn’t target your backup data, but your live M365 environment.
Here’s what’s different this time: Attackers weaponized a critical, previously unknown vulnerability (CVE-2025-3928) in the Commvault Web Server, used by Metallic, to gain authenticated access. From there, they deployed webshells, took control of servers, and—most importantly—stole application credentials (“client secrets”) that allowed them to impersonate the backup app in your M365 tenant. That means direct access to email, files, and services. Not just stale backups. The live stuff.
The threat isn’t a maybe. Its not just a textbook warning. Its happening. Now. CISA has placed CVE-2025-3928 in its Known Exploited Vulnerabilities (KEV) catalog, and federal agencies faced an emergency patch deadline in May 2025. If your organization uses Commvault Metallic to safeguard Microsoft 365, it’s time to check your environment—and act fast.
LETS BREAK IT DOWN…
Understanding CVE-2025-3928
CVE-2025-3928 is an “unspecified vulnerability” in Commvault Web Server (versions 11.36.0–11.36.45, 11.32.0–11.32.88, 11.28.0–11.28.140, and 11.20.0–11.20.216) affecting both Windows and Linux deployments. With low-privilege, authenticated access, an attacker could upload and execute a webshell. That’s bad news. In one stroke, the attacker gets persistent, remote control—bypassing even multi-factor authentication protections that rely on standard logins.
-
CVSS 3.1 Score: 8.8 (High)
-
CVSS 4.0 Score: 8.7 (High)
-
Attack Complexity: Low, provided credentials are in hand
The kicker? Attackers must have valid credentials to get started. How they got those credentials—phishing, password spraying, or another vulnerability—isn’t fully public, but it’s the classic “multi-stage kill chain” that nation-state actors favor.
The Timeline: From Discovery to Disclosure
A Visual Chronicle of the Breach
This timeline provides a detailed account of the events leading up to and following the discovery of a significant security breach involving Commvault Metallic’s M365 client secrets.
February 2025
Microsoft alerts Commvault to unusual activity detected in Azure, suggesting potential nation-state involvement.
INITIAL SUSPIICION RAISED
April 2025
THREAT INTELLIGENCE UPDATE
Commvault releases new advisories based on fresh threat intelligence, highlighting the evolving nature of the attack.
April 28, 2025
The Cybersecurity and Infrastructure Security Agency (CISA) includes CVE-2025-3928 in its Known Exploited Vulnerabilities catalog, warning of active exploitation.
CVE-2025-3928 CATALOGED
May 22, 2025
MAJOR ALERT ISSUED
CISA issues a comprehensive alert linking the breach to the theft of M365 client secrets, emphasizing the need for immediate action.
Technical Overview
"Jon, Stop making a big deal of this. They said the backup data wasn't impacted. Relax."
Ok, I hear you. Panic Less, Patch More… right? That is still sage advice to live by, and is still our mantra. But do not conflate urgency and panic. As a matter of survival, you’d better develop some urgency even if you lose your panic.
Let’s look at this straight: Commvault states there was no breach of the backup data stored within their systems. But the real damage wasn’t in the backups—it was in the ability for attackers to impersonate the Metallic app and access customers’ live Microsoft 365 environments. Tell me again how relieved I should be that my backups weren’t impacted while they’re pushing ransomware to my users via intune. I’ll wait.
What does that mean in practice? If the attackers have your M365 client secret, they can use the same permissions granted to Metallic. That could mean:
-
Stealing data from user inboxes
-
Downloading or tampering with SharePoint/OneDrive files
- Deploy applications/policies via Intune
-
Running email campaigns from your own trusted addresses
-
Using your tenant as a springboard for further cloud attacks.
- What else do you use M365 for? Yeah. That’s theirs too.
- Game over. Thanks for playing.
This is the nightmare scenario: trust in a backup vendor turning into a cloud-wide. access problem.
Mitigation Checklist
Immediate Patching
Ensure all Commvault Web Servers are updated to the latest versions to close the vulnerability gap.
Secret Rotation
Rotate all M365 client secrets associated with Metallic to prevent unauthorized access.
Audit Log Review
Thoroughly examine Microsoft Entra ID and Unified Audit Logs for any signs of suspicious activity or abuse.
Conditional Access
Implement Conditional Access policies to limit app authentication to trusted sources only.
Privilege Management
Enforce the principle of least privilege for all M365 applications to minimize potential damage from breaches.
Web Application Firewall
Deploy a Web Application Firewall to protect against web-based attacks and restrict internet exposure of Commvault interfaces.
Regular Secret Rotation
Adopt a policy of rotating secrets every 30–90 days to enhance security posture.
CISA SCuBA Guidance
Follow CISA SCuBA project guidelines for hardening M365 environments against potential threats.
Understanding the Attack Chain
Step 1
Gain Initial Access: Attackers leverage stolen credentials to infiltrate systems.
Step 2
Deploy Webshell: Exploit vulnerabilities to maintain persistent access.
Step 3
Escalate Privileges: Use webshells to gain higher-level access and control.
Strategic Insights
Implications for Security Strategy
This isn’t just another backup vendor breach.
It’s a wake-up call about identity and privilege sprawl in the cloud. If your SaaS backup provider is compromised, your “air-gapped” backup data might be fine, but your operational environment could be wide open.
Nation-state threat actors are behind this campaign. That means they’re patient, skilled, and their motives go beyond quick financial gain. Think long-term access, intelligence gathering, and supply chain manipulation.
CISA believes this is part of a broader campaign targeting SaaS providers, particularly those with overly permissive default configurations or elevated privileges.
Discover the Full Story
Curious about the intricate details of CVE-2025-3928? Dive into our Technical Deep Dive for a comprehensive analysis.
Want the nitty-gritty detail?
Read the Security Blotter Deep Dive. Expand the red section at the top of the page.
Panic Less. Patch More.

