On May 23, 2025, CISA issued an urgent advisory after nation-state attackers exploited a zero-day in Commvault’s Metallic Microsoft 365 backup SaaS platform. If your organization uses Commvault for M365 integration, you should review credential activity, reduce permissions, and monitor for suspicious behavior immediately. While the direct risk is limited to Commvault customers, this incident is part of a rising wave of third-party SaaS attacks. Every organization should take this moment to evaluate how secrets and permissions are managed across their cloud ecosystem.
Read on for a rapid response plan and deeper guidance on defending your SaaS environment.
If you are an existing Vorlon customer, click here for the playbook.
CISA’s alert stems from an attack on Commvault’s Metallic backup platform, hosted in Microsoft Azure. Threat actors exploited a zero-day vulnerability (CVE-2025-3928) in the Commvault web server, allowing them to create web shells and gain unauthorized access. Critically, the attackers may have obtained client secrets (application credentials) that Commvault maintains for some customers to connect to their Microsoft 365 (M365) environments.
Commvault reports that no customer backup data was compromised, but some application secrets were potentially exposed. These credentials could allow attackers to access or manipulate customer M365 data, depending on granted permissions.
Who is at immediate risk?
Who is not directly impacted by this incident?
If your organization uses Commvault’s Metallic (or similar SaaS backup connectors for Microsoft 365), take these immediate steps:
First, for a quick assessment of your status, filter by M365, look for alerts and insights. Open the alert, collect the insight, and follow the actions in the response section (or ask our MCP AI server) to remediate against potential risk. For more in depth investigation, we recommend you to:
Questions or concerns?
Reach out to Vorlon Customer Success any time. We’re here to support you.
CISA’s advisory points to a larger trend:
Even if you don’t use Commvault, ask yourself:
The Commvault incident underscores why SaaS ecosystem security needs to evolve beyond point-in-time audits and manual reviews:
If you are a Commvault Metallic M365 backup customer, take action now. If you aren’t, use this moment to review the security of your SaaS integrations, secrets, and third-party permissions.
Attackers are moving beyond phishing and brute force. They’re exploiting the invisible web of machine identities, app secrets, and integrations that power modern SaaS.
The right visibility and controls can turn a potential crisis into a manageable incident.
Worried about SaaS integration risk? Let’s talk.
Anil Agrawal
Security Researcher at Vorlon
Anil Agrawal is a security researcher at Vorlon specializing in SOC optimization and has over eight years of experience in cybersecurity. Before joining Vorlon, he served as a Solutions Architect at Palo Alto Networks, where he designed advanced automation solutions and cybersecurity strategies for Fortune 500 clients. His career includes technical roles at Syracuse University, where he streamlined incident response processes and conducted malware analysis. Anil holds a Master’s degree in Management Information Systems from Syracuse University with a specialization in Information Security Management. Passionate about mitigating third-party application risks, he focuses on pioneering R&D to address evolving cybersecurity challenges. Connect with Anil on LinkedIn to explore collaborations in security innovation and stay updated on his latest contributions.