Improper default permission setting exposed personally identifiable information (PII) of over 30 million US citizens from across a few hundred portals, according to cybersecurity (opens in new tab) researchers.
The UpGuard Research team discovered over a thousand anonymously accessible lists across a few hundred portals that included sensitive details such as an individual’s Covid-19 vaccination status, along with their phone numbers, home address, and social security number (SSN), and more.
The data leaked from improperly configured PowerApps (opens in new tab) portals, which not just allowed access to public data as expected, but also exposed private data without anyone being the wiser.
- These are the best database software (opens in new tab)
- Here’s our list of the best cloud databases (opens in new tab) on the market
- Check our roundup of the best cloud storage (opens in new tab) services
“The UpGuard Research team can now disclose multiple data leaks resulting from Microsoft PowerApps portals configured to allow public access - a new vector of data exposure,” state the researchers in their analysis of the leak (opens in new tab).
Feature or a misconfiguration?
The type of information that the researchers were able to access varied from one organization to the next. In all, the researchers managed to gawk at data from about four dozen entities, including governmental bodies like Indiana, Maryland, and New York City, and private companies like American Airlines, Ford, JB Hunt, and more.
The researchers believe that the staggering amount of exposure highlights a shortcoming on Microsoft’s part, in that it failed to properly convey the default settings and the behavior of the PowerApps platform.
“Our conversations with the entities we notified suggested the same conclusion: multiple governmental bodies reported performing security reviews of their apps without identifying this issue, presumably because it has never been adequately publicized as a data security (opens in new tab) concern before,” note the researchers.
Microsoft initially dismissed UpGuard’s revelations as it was “determined that this behavior is considered to be by design.”
However, as UpGuard began contacting the affected entities, Microsoft took several steps to help its customers avoid leaking data inadvertently. For instance, the company has now released a tool to check for lists that allow anonymous access and also modified the default table permissions.
- These are the best data loss prevention services (opens in new tab)