What the 2025 Commvault SaaS breach teaches about cloud misconfigurations, third-party risk and defending identity in the cloud.
When organisations move to SaaS, they often assume security is “handled by the provider”. The 2025 breach of Commvault’s Metallic SaaS platform is a reminder that responsibility is shared, not outsourced.
In early 2025, Microsoft notified Commvault of suspicious activity in its Azure environment. Subsequent investigations and advisories from Commvault and CISA describe how a state-linked threat actor exploited a zero-day in Commvault’s web server (CVE-2025-3928) and abused stored application secrets to gain access to customers’ Microsoft 365 environments.
Although Commvault has patched the vulnerability and worked with affected customers, the incident offers valuable lessons for any organisation relying on SaaS for backup, collaboration or line-of-business workloads.
Publicly available information paints the following high-level picture:
While the number of affected customers appears limited, the scenario touches three recurring cloud security themes: misconfigurations and defaults, identity abuse and third-party risk.
ENISA’s long-standing guidance on cloud computing emphasises that economies of scale make cloud both more secure and more attractive for attackers. In the Commvault case:
For cloud and SaaS security teams, that means:
The core pivot in the Commvault incident was not just web shell deployment, but access to stored secrets. CISA’s advisory stresses that attackers may have obtained client secrets used to authenticate into M365 environments and that organisations should review service principals and Entra logs for misuse.
Practical actions include:
DACTA Global’s identity-focused assessments increasingly treat third-party application permissions as first-class risk items, on par with privileged human accounts.
Recent analyses of major breaches in 2024–2025 show that third-party and supply chain exposures are central to many large incidents, particularly in cloud and SaaS environments. The Commvault breach fits this pattern:
Strengthening third-party SaaS risk management means:
While CVE-2025-3928 was a zero-day at the time of exploitation, advisories and independent analyses highlight that misconfigurations and over-privileged defaults played a key role in the broader campaign. That aligns with broader research showing that cloud misconfigurations remain a leading cause of SaaS security incidents.
Controls to reduce this risk include:
Even if you are not a Commvault customer, the incident provides a ready-made tabletop exercise scenario. A simple exercise could cover:
DACTA Global often runs such exercises with clients as part of Cyber Resilience and Incident Response Readiness engagements, using real-world breaches as templates to stress-test processes.
The Commvault SaaS breach is unlikely to be the last incident where attackers weaponise a mix of zero-day flaws, misconfigurations and over-privileged integrations. For CISOs and cloud leaders, the most important mindset shift is from implicit trust in providers to continuous verification:
Organisations that invest now in visibility, least privilege and third-party risk management will be better positioned to use SaaS as an enabler, rather than a hidden source of systemic risk.
If you're experiencing an active security incident and need immediate assistance, contact the DACTA Incident Response Team (IRT) at support@dactaglobal.com.