Security Alert: Copilot's failure exposes confidential emails despite safety labels

Published 4 min de lectura 129 reading

Microsoft has recognized a Microsoft 365 Copilot failure that, since the end of January, allowed the IA assistant to read and summarize emails marked as confidential, thus avoiding the policies that many companies use to protect sensitive information. The company detected the problem at the end of January and reported it to its internal message center (referred to as CW1226324), while specialized means such as BleepingComputer have followed the case and published additional details.

The error specifically affected the chat functionality of the Copilot working section - the assistant-type interaction that can help to summarize and synthesize stored content in the Microsoft 365 environment - and made messages saved in the sent elements and drafts folders included in summaries despite wearing sensitivity labels designed to limit automated access. In simple terms: emails that should be left out of the reach of automatic tools were being processed by the IA.

Security Alert: Copilot's failure exposes confidential emails despite safety labels
Image generated with IA.

Microsoft attributed the problem to a code failure and started deploying a correction in early February. According to the company, the deployment continues to be monitored and affected users are being contacted in a limited way to verify that the solution works. However, Microsoft has not yet offered a final timeline for full remediation and has not detailed how many organizations or accounts could be compromised; the incidence is listed as a service notice, a label that is usually used when the scope is considered to be initially reduced.

Why is this relevant? Sensitivity labels and data loss prevention policies (DLP) are pillars of governance in corporate environments: they are designed to prevent financial, legal, health or any classified data from being accessible or out of certain perimeters, including automatic processes. Microsoft publishes documentation on how these labels and DLP policies work on its compliance portal ( Sensitivity label guide), and in environments with strict regulatory requirements to trust that these protections operate properly is critical.

From a risk perspective, even if the incident classified as "warning" finally affects a limited number of cases, the ability of an IA tool to read and summarize confidential content opens up several fronts: exposure of business secrets, regulatory compliance risks, and of course an impact on internal confidence on the use of automated assistants in sensitive processes. The combination of powerful productivity functions with insufficient confidence in access controls can create unnoticed risk situations.

Security Alert: Copilot's failure exposes confidential emails despite safety labels
Image generated with IA.

For IT and security equipment that manage Microsoft 365, the immediate recommendation is to check the audit records and policies around Copilot, review the sensitivity and DLP settings, and keep in touch with Microsoft support to know the actual scope and recommended actions. It is also worth considering temporary mitigation measures - such as adjusting access permits to Copilot or limiting the use of the work tab until the correction is fully verified - and documenting any findings in case it is necessary to demonstrate compliance with auditors or authorities.

Microsoft offers information about Copilot and its operation within the business suite in its official documentation ( Microsoft 365 Copilot page), which can serve as a reference when reviewing how these capacities are integrated with existing security and privacy policies. In parallel, technology media have been monitoring official communications and state updates, so following specialized sources helps to keep you informed about new developments.

In the end, this episode emphasizes a lesson that was already ringing in the sector: IA functionalities offer clear advantages in productivity, but require specific controls and verifications. It is not enough to enable smart assistants for their immediate value; they must be integrated into a governance framework that ensures that data protections apply as expected. Organizations that depend on sensitivity labels and DLP should use this moment to audit their position and, above all, to validate that third-party tools and new automated capabilities respect the rules that keep their information secure.

Coverage

Related

More news on the same subject.