What happened
A medium-severity vulnerability in Microsoft Authenticator, CVE-2026-26123, can let a malicious app on the same phone capture authentication deep links and potentially expose one-time sign-in data.
The issue affects Microsoft Authenticator on Android and iOS and requires local user interaction (for example, choosing the wrong app handler for an authentication deep link).
Why this matters
Authenticator apps are part of your account recovery and multi-factor login flow. If attackers can intercept authentication links or codes on a compromised phone, they may be able to:
- Complete sign-ins to accounts protected by Authenticator.
- Bypass expected MFA friction during phishing-style login attempts.
- Reuse access to pivot into email, cloud storage, or workplace apps.
What to do right now
- Update Microsoft Authenticator from the App Store / Google Play immediately.
- Remove unknown or recently installed apps that requested unusual permissions.
- Review account sign-in history for unfamiliar devices and locations.
- Revoke active sessions and rotate passwords for sensitive accounts.
- Prefer phishing-resistant MFA where available (passkeys, hardware keys).
How to check if you’re affected
Affected services/devices:
- Microsoft Authenticator on Android and iOS devices.
- Higher risk if your phone has untrusted apps installed that can register URL handlers.
Quick verification steps:
- Check app version now
- Android: Play Store → Microsoft Authenticator → verify you are on the latest available build.
- iOS: App Store → Microsoft Authenticator → verify you are on the latest available build.
- Confirm recent unusual prompts
- If you recently saw prompts asking which app should open a sign-in/auth link, treat as suspicious.
- Audit account activity
- In your Microsoft account and connected services, review recent sign-ins for unknown IPs/devices.
- Contain if suspicious
- Remove untrusted apps, force sign-out everywhere, and re-enroll MFA on a clean device.
Sources
- https://www.cve.org/CVERecord?id=CVE-2026-26123
- https://nvd.nist.gov/vuln/detail/CVE-2026-26123
- https://www.darkreading.com/application-security/microsoft-patches-83-cves-march-update
- https://www.malwarebytes.com/blog/news/2026/03/microsoft-authenticator-could-leak-login-codes-update-your-app-now
Bottom line
This is not a remote wormable bug, but it is still dangerous for people with risky app hygiene. Patch Authenticator immediately and review sign-in activity for signs of token or code interception.
