Skip to main content

Microsoft fixes exposed TLS key for Dynamics 365 Finance and Operations, Enterprise (at long last)

by MSDW Reporter
Editorial Team,

Customers of Microsoft Dynamics 365 Finance and Operations Enterprise edition were vulnerable to "man-in-the-middle" attacks for three months before Microsoft resolved the exposure. And according to the developer who discovered it, Microsoft only deployed a fix  after increasing pressure that made the issue public.

German software developer Matthias Gliwka describes himself as a "curious world traveler, hacker and software engineer." Details are hard to nail down on Gliwka, but he appears to be an independent, who maintains an infrequently updated blog. It was there, last week, where he described the 100-day journey to resolution of the Dynamics 365 cloud security issue.

Gliwka described in an August 17, 2017 email to the Microsoft Security Response Center (MSRC) (, that he had noticed a vulnerability in the Azure-hosted D365FOE environments. As he described:

Each separate customer environment...uses the same wildcard server certificate (including the private key) for the domain *, meaning the service hosted for Acme Inc. at uses the same TLS wildcard certificate as Evil Inc. hosted at

Thus, one valid TLS certificate would serve them all, and Gliwka found it easy to access. And as he points out, sandbox environments are usually mirror instances of production instances (e.g., critical customer data in CRM); these used a wildcard certificate as well, for [customer]

The implications as Gliwka describes them:

    <... class="become-member ms-auto me-auto">

    FREE Membership Required to View Full Content:

    Joining gives you free, unlimited access to news, analysis, white papers, case studies, product brochures, and more. You can also receive periodic email newsletters with the latest relevant articles and content updates.
    Learn more about us here

About MSDW Reporter
More about MSDW Reporter