Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    I saw the future of TV in Samsung’s South Korea lab — and I’m excited for these 3 things

    November 9, 2025

    Very few people are talking about this budget laptop from Lenovo that over-delivers

    November 9, 2025

    This battery analyzer I discovered is a power users dream – how it looks different

    November 9, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Microsoft Entra ID Flaw allowed the tenant of any company to kidnap
    Security

    Microsoft Entra ID Flaw allowed the tenant of any company to kidnap

    PineapplesUpdateBy PineapplesUpdateSeptember 21, 2025No Comments5 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Microsoft Entra ID Flaw allowed the tenant of any company to kidnap
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Microsoft Entra ID Flaw allowed the tenant of any company to kidnap

    A significant combination of heritage components can have a complete access to the Microsoft Entra ID tenant of every company in the world.

    The malignant mixture included a wanderer called “actor tokens” and a vulgarity in the AD Graf API (CVE-2025-55241), which allowed the tokens to work with any organization’s entra ID environment.

    A threat -threatening actor, who exploited the issue, would have access to a sleeve of highly sensitive data without leaving any marks in the log in the target environment.

    Entra ID is the cloud-based identity and access management (IAM) service of Microsoft, which is first known as Azure Active Directory (Azure Ad), which provides universities with single sign-on, multi-factor authentication and safety control in applications and resources.

    A dedicated Entra ID example represents a single outfit and manages safe access to all apps used, both on-rude and cloud-based.

    This may include Microsoft 365 services, customs and third-party SAAS products such as salesforce, dropbox, or google, amazon or sap to cloud apps.

    Security researcher Dirk-Jan Molema, founder of aggressive security External securityDiscovered a token verification defect, which gave him global administrator privileges in every entra ID tenant.

    This level of access allows a full tenant to compromise and opens the door for any service certified through the Entra ID.

    Implementing any user to a tenant

    In a technical blog post, Molema states that actor token is issued by a heritage service called Access Control Service, which is used for authentication with Sharepoint applications and is also used internally by Microsoft. “

    The researcher found them while examining the hybrid exchange setup. He noticed that the exchange would request him when communicating with other services on behalf of the user.

    “The actor token allows it to ‘act’ as another user in the tenant while talking to the exchange, Sharepoint and as it turns out to Azure Ad Graph” – Dirk-jan molema

    Actor tokens are not signed, meaning that they can be used to apply any user in the tenant, and there is a 24 -hour validity without the possibility of cancellation of during this period.

    Molema says that “this whole actor token design is something that should never exist,” because they lack the proper necessary safety controls:

    • There are no logs when actor token is released
    • Since these services can prepare an unknown repatriation token without talking to Antra ID, there is no log when they are made or used.
    • They cannot be canceled within their 24 -hour validity
    • They bypass any restrictive ban on completely conditional access.
    • We have to rely on logging from the resource provider to know that these tokens were used in the tenant.

    The researcher says that the Microsoft service-to-service communication depends internally on the actor token and the company plans to remove them.

    Microsoft calls them “High-liencile access (HPA)“This allows an application or service,” to copy other users without providing any evidence of the user reference.

    When testing several methods to use an actor token, Molema replaced the tenant ID separate from the token tokens, and sent it to the post -based azure advertising graph API (((Graph.windows.net), Expecting the message “Access refusal”.

    Instead, the error that the researcher saw, indicated that the token was valid, but the access was unauthorized because the user was not identified in the tenant.

    Azure ad graph error indicates that the token is valid but the user does not exist
    Azure ad graph error indicates that the token is valid but the user does not exist
    Source: Dirk-jan molema

    Mollema tried again, this time with a valid user ID from the target tenant, and returned the data requested to Azure Ad Graph API.

    “I tested it in some more test tenants, which I had access to, to make sure I was not crazy, but I could actually use data in other tenants, as long as I knew his tenant ID (which is public information) and a user’s nattid in that tenant.”

    Using the same actor token, the researcher was able to apply Global administrator Do all the tasks in the target tenant and the role (such as manage and create users of different roles, modify the configuration, reset the password, add the admin).

    Mollema has highlighted that any action required to obtain a global administrator privilege has not generated any log in the suffering tenant.

    From the point of view of an attacker, exploiting issues must have been possible in some stages, starting with a tenant to generate actor tokens under his control:

    • Finding tenant ID for the targeted environment can be done with public API based on the name domain
    • Target Targe
    • Crafts a copy token with an actor token from the attacking tenant using tenant ID and Netid User in the afflicted tenant
    • List the tenant and all their global appreciation Netid
    • Craft a copy of a copy token for a global administrator
    • Azure ad graph display any reed/right action through API

    Molema noted that in the final phase only the activity would be recorded in the tenant suffering.

    It is important to note that Microsoft launched the exception process for Azure Ad Graph API service in September last year.

    In late June, the company warned that the apps were configured for Extended access But the Azure Ad graph was still used which will no longer be able to use API from the beginning of September 2025.

    Molema reported issues to Microsoft on 14 July and the company confirmed that the problem was resolved nine days later.

    On September 4, Microsoft also Patch cve-2025-55241To describe it as a significant privilege increase in Azure Entra.


    Picus Blue Report 2025

    The passwords broke in 46% of the atmosphere, almost doubled by 25% last year.

    Picus Blue Report 2025 Now get a wider look at more conclusions on prevention, detection and data exfIs.

    allowed Company Entra Flaw kidnap Microsoft tenant
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleI swung on the iPhone 17 full -time, and I already wondering if I need a supporter
    Next Article Agentic AI – Der Nau Horror Fur Sicherhitsshider?
    PineapplesUpdate
    • Website

    Related Posts

    AI/ML

    How to Prepare Your Company for a Passwordless Future – in 5 Steps

    November 4, 2025
    Startups

    Google parent company Alphabet reports first $100B quarter

    October 31, 2025
    Startups

    Microsoft Said My PC Can’t Run Windows 11, But I Still Upgraded in 5 Minutes – Here’s How

    October 30, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    I saw the future of TV in Samsung’s South Korea lab — and I’m excited for these 3 things

    November 9, 2025

    Very few people are talking about this budget laptop from Lenovo that over-delivers

    November 9, 2025

    This battery analyzer I discovered is a power users dream – how it looks different

    November 9, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.