Teams Admin Center Log Exposes Sensitive Data During Config Changes
CVE-2025-14432 Published on December 16, 2025
Poly Video - Sensitive Data Might Be Written to Log File
In limited scenarios, sensitive data might be written to the log file if an admin uses Microsoft Teams Admin Center (TAC) to make device configuration changes. The affected log file is visible only to users with admin credentials. This is limited to Microsoft TAC and does not affect configuration changes made using the provisioning server or the device WebUI.
Weakness Type
Insertion of Sensitive Information into Log File
Information written to log files can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information.
Products Associated with CVE-2025-14432
Want to know whenever a new CVE is published for Microsoft Teams? stack.watch will email you.
Affected Versions
HP Inc Poly G7500:- Before <PolyOS 4.6.1-444242 is affected.
- Before <PolyOS 4.6.1-444242 is affected.
- Before <PolyOS 4.6.1-444242 is affected.
- Before <PolyOS 4.6.1-444242 is affected.
- Before <PolyOS 4.6.1-444242 is affected.
- Before <PolyOS 4.6.1-444242 is affected.
- Before <PolyOS 4.6.1-444242 is affected.
- Before <PolyOS 4.6.1-444242 is affected.
- Before <PolyOS 4.6.1-444242 is affected.
- Before <PolyOS 4.6.1-444242 is affected.
- Before <PolyOS 4.6.1-444242 is affected.
- Before <PolyOS 4.6.1-444242 is affected.
- Before <PolyOS 4.6.1-444242 is affected.
- Before <PolyOS 4.6.1-444242 is affected.
- Before <TCOS 6.6.1-7001859 is affected.
- Before <TCOS 6.6.1-7001859 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.