Microsoft this week announced the launch of a new bug bounty program for its Dynamics 365 enterprise resource planning (ERP) and customer relationship management (CRM) applications.
The company has invited both independent researchers and organizations to find vulnerabilities in Dynamics 365 online applications and on-premises products.
Rewards range between $500 and $20,000, but Microsoft says higher amounts may also be awarded depending on impact, severity and quality of the vulnerability report.
Critical remote code execution flaws are worth between $10,000 and $20,000, and privilege escalation and information disclosure issues can earn researchers between $3,000 and $8,000 if they are rated “critical.” Denial-of-service (DoS) bugs are out of scope.
“A high-quality report provides the information necessary for an engineer to quickly reproduce, understand, and fix the issue. This typically includes a concise write up or video containing any required background information, a description of the bug, and a proof of concept (PoC),” Microsoft says on its Dynamics 365 bug bounty page. “We recognize some issues are extremely difficult to reproduce and understand and will take this into considered when assessing the quality of a submission.”
Researchers interested in the new program can create a free trial account for Dynamics 365.
Microsoft also announced that its bug bounty programs have been grouped into three categories: Cloud Programs, Defense Programs, and Platform Programs. The new Dynamics 365 program is part of the Cloud category.
The company revealed in April that last year it paid out over $2 million to researchers who submitted vulnerability reports through its bug bounty programs. At the time, it also announced increased rewards and teaming up with HackerOne for payment processing and support.
Related: Microsoft Launches Windows Bug Bounty Program
Related: Microsoft Launches Azure DevOps Bug Bounty Program
Related: Microsoft Offers $100,000 in New Identity Bug Bounty Program

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- UK Car Retailer Arnold Clark Hit by Ransomware
- EV Charging Management System Vulnerabilities Allow Disruption, Energy Theft
- Unpatched Econolite Traffic Controller Vulnerabilities Allow Remote Hacking
- Google Fi Data Breach Reportedly Led to SIM Swapping
- Microsoft’s Verified Publisher Status Abused in Email Theft Campaign
- British Retailer JD Sports Discloses Data Breach Affecting 10 Million Customers
- Meta Awards $27,000 Bounty for 2FA Bypass Vulnerability
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
Latest News
- F5 Working on Patch for BIG-IP Flaw That Can Lead to DoS, Code Execution
- Flaw in Cisco Industrial Appliances Allows Malicious Code to Persist Across Reboots
- UK Car Retailer Arnold Clark Hit by Ransomware
- Dealing With the Carcinization of Security
- HeadCrab Botnet Ensnares 1,200 Redis Servers for Cryptomining
- Cyber Insights 2023 | Supply Chain Security
- Cyber Insights 2023: Regulations
- Cyber Insights 2023: Ransomware
