Microsoft Adds Power Platform to Bug Bounty Program

Microsoft this week announced that it is now accepting vulnerability submissions for the Power Platform.

Security researchers who hunt for and report security errors in Power Platform can now earn up to $20,000 in bounty rewards for severe flaws, as part of the recently rebranded Dynamics 365 and Power Platform Bounty Program.

“Through this expanded program, we encourage researchers to discover and report high impact security vulnerabilities they may find in the new Power Platform scope to help protect customers,” Microsoft announced.

Power Platform products in scope of the bug bounty program include Power Apps, Power Automate, Power Virtual Agent, and Power Portals.

Dynamics 365 applications in scope include a broad range of online applications, as well as various on-premises products, as detailed on the program’s page.

Microsoft is willing to hand out payouts ranging between $500 and $20,000 for vulnerabilities identified in these products, depending on their impact.

Researchers may receive the highest bounty rewards for remote code execution bugs that feature a critical severity, while elevation of privilege and information disclosure issues may be awarded up to $8,000 in rewards.

“A high-quality report provides the information necessary for an engineer to quickly reproduce, understand, and fix the issue. This typically includes a concise write up or video containing any required background information, a description of the bug, and a proof of concept (PoC),” Microsoft explains.

The tech giant says it will grow the Dynamics 365 and Power Platform Bounty Program as it identifies new areas that are deemed eligible for rewards.

Related: Microsoft Adds Teams Mobile Applications to Bug Bounty Program

Related: Microsoft Paid Out $13.6 Million in Bug Bounties in Past Year

Related: Microsoft Pays $50,000 Bounty for Account Takeover Vulnerability

view counter

Ionut Arghire is an international correspondent for SecurityWeek.

Previous Columns by Ionut Arghire:

Don't forget to share

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *