Weekly threat roundup: Microsoft Teams, iOS, Samsung Galaxy
Pulling together the most dangerous and pressing flaws that businesses need to patch
Patch management is far easier said than done, and security teams may often be forced into prioritising fixes for several business-critical systems, all released at once. It’s become typical, for example, to expect dozens of patches to be released on Microsoft’s Patch Tuesday, with other vendors also routinely getting in on the act.
Below, IT Pro has collated the most pressing disclosures from the last seven days, including details such as a summary of the exploit mechanism, and whether the vulnerability is being exploited in the wild. This is in order to give teams a sense of which bugs and flaws might pose the most dangerous immediate security risks.
Zero-day allowed hackers to steal files from Microsoft Teams
A vulnerability in the Microsoft Power Apps service on Microsoft Teams can be exploited by an attacker to gain persistent read/write access to a victim’s email, Teams chats, OneDrive storage, Sharepoint, and a host of other services.
The side-server vulnerability, which has now been patched, affects Power Apps, a service that allows businesses to create specific use-cases on Microsoft products to suit their own needs.
These applets would manifest as tabs. Hackers could exploit the flaw by setting up a malicious tab, which when opened by the victim, would grant them access to private communications and files.
The attacker could also disguise themselves as a victim and send emails and messages on their behalf, according to Even Grant, a research engineer at Tenable, allowing them to conduct further social engineering attacks.
Hackers exploit WebKit Engine flaws in iOS
Apple released an emergency update for iOS 12 this week after revealing that hackers had exploited two zero-day flaws to launch remote code execution attacks on devices hosting the operating system.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The flaws, tracked as CVE-2021-30761 and CVE-2021-30762, lie in the open source WebKit browser rendering engine. This is used to power the Safari web browser, as well as various iOS, macOS, watchOS, and Apple TV apps and services.
The first is a memory corruption issue, while the second is a use-after-free bug, and they have been fixed with “improved state management” and “improved memory management” respectively in iOS 12.5.3.
These are just the latest flaws to affect the WebKit browser engine that hackers have successfully exploited since the start of the year. In total, Apple has patched seven WebKit-related flaws since January 2021.
Supply chain bug in connected cameras
A widely used software development kit (SDK) in IoT-enabled cameras, developed by ThroughTek, is embedded with a flaw that has exposed swathes of industrial hardware to potential cyber attacks.
The vulnerability in ThroughTek’s P2P SDK, which is used to provide remote access to audio or video feeds over the internet, can grant hackers access to media feeds as well as sensitive data. Cyber criminals could also exploit the flaw, rated 9.1 out of ten on the CVSS threat severity scale, to spoof devices and hijack their certificates.
The vulnerable SDK is used by multiple camera vendors and is deployed in many CCTV systems, as well as IoT devices like baby monitors. Nozomi Networks researchers discovered the flaw, and reported it to ThroughTek in line with the firm’s disclosure policy.
Although ThroughTek has updated its SDK to remove the flaw, IoT devices made by customers that haven’t updated their SDKs will still be vulnerable. The severity of the bug, and likelihood of exploitation, has prompted the US Cybersecurity & Infrastructure Agency (CISA) to issue an alert to businesses with guidance on how to mitigate against attacks.
Samsung phones vulnerable to takeover
RELATED RESOURCE
A guide to enterprise detection and response providers
The 12 providers that matter most and how they stack up
Pre-installed apps bundled with Samsung Galaxy smartphones were embedded with seven vulnerabilities that could have allowed hackers to access sensitive data and take over control of the device.
The seven flaws, discovered by Oversecured, were found in Knox Core, Managed Provisioning, Secure Folder, SecSettings, Samsung DeX System UI, Telephony UI, and PhotoTable. If exploited the bugs could allow cyber criminals to edit contacts, calls, and text messages, while breaching an unpatched device could also let hackers install malicious apps with administrative rights, and change the device’s default settings.
Samsung updated the software for all affected apps, which users need to apply as soon as possible if they haven’t done so already, although the firm wouldn’t reveal which devices could be exploited.

Keumars Afifi-Sabet is a writer and editor that specialises in public sector, cyber security, and cloud computing. He first joined ITPro as a staff writer in April 2018 and eventually became its Features Editor. Although a regular contributor to other tech sites in the past, these days you will find Keumars on LiveScience, where he runs its Technology section.
-
The evolution of the enterprise laptopLong read A more mobile workforce, global macro conditions, and AI adoption will all drive the next evolution of laptops
-
Satya Nadella woos Windows users with OS improvement pledgesNews Satya Nadella told analysts that Microsoft is doing “foundational work to win back fans” across Windows, Xbox, Bing, and Edge
-
Brace yourselves for a vulnerability explosion, Forescout warnsNews AI advances are helping identify software flaws at record pace and scale, but that's not the good news some would think
-
Ubuntu vulnerability exposes enterprises to root escalation, complete system compromiseNews The high-severity Ubuntu vulnerability allows an unprivileged local attacker to escalate privileges through the interaction of two standard system components
-
Organizations hit by 90 zero-day vulnerabilities last yearNews Google Threat Intelligence researchers warn that edge devices and security appliances are prime entry points
-
Security agencies issue warning over critical Cisco Catalyst SD-WAN vulnerabilityNews Threat actors have been exploiting the vulnerability to achieve root access since 2023
-
Millions of developers could be impacted by flaws in Visual Studio Code extensions – here's what you need to know and how to protect yourselfNews The VS Code vulnerabilities highlight broader IDE security risks, said OX Security
-
CVEs are set to top 50,000 this year, marking a record high – here’s how CISOs and security teams can prepare for a looming onslaughtNews While the CVE figures might be daunting, they won't all be relevant to your organization
-
Microsoft patches six zero-days targeting Windows, Word, and more – here’s what you need to knowNews Patch Tuesday update targets large number of vulnerabilities already being used by attackers
-
Experts welcome EU-led alternative to MITRE's vulnerability tracking schemeNews The EU-led framework will reduce reliance on US-based MITRE vulnerability reporting database