Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Clicks Communicator announced: the modern answer to a classic BlackBerry device

    If you’re unsure about investing, this $55 OpenAI-backed tool simplifies everything

    This 130-inch OLED TV sticks to a wall with suction tech

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      A new pope, political shake-ups and celebs in space: The 2025-in-review news quiz

      December 31, 2025

      AI has become the norm for students. Teachers are playing catch-up.

      December 23, 2025

      Trump signs executive order seeking to ban states from regulating AI companies

      December 13, 2025

      Apple’s AI chief abruptly steps down

      December 3, 2025

      The issue that’s scrambling both parties: From the Politics Desk

      December 3, 2025
    • Business

      Top 10 cloud computing stories of 2025

      December 22, 2025

      Saudia Arabia’s STC commits to five-year network upgrade programme with Ericsson

      December 18, 2025

      Zeroday Cloud hacking event awards $320,0000 for 11 zero days

      December 18, 2025

      Amazon: Ongoing cryptomining campaign uses hacked AWS accounts

      December 18, 2025

      Want to back up your iPhone securely without paying the Apple tax? There’s a hack for that, but it isn’t for everyone… yet

      December 16, 2025
    • Crypto

      Aave Price Jumps Amid Revenue Sharing Plans With Token Holders

      January 3, 2026

      Grayscale Predicts Bitcoin Will Reach New All-Time High by March 2026

      January 3, 2026

      Tom Lee Pushes for Big Share Increase as BitMine Closely Tracks Ethereum Price

      January 3, 2026

      Bitfinex Hacker Out of Prison After a Year Due to President Trump’s First Step Act

      January 3, 2026

      Will 2026 Deliver an Extreme Crypto Bear Market? Experts Weigh In

      January 3, 2026
    • Technology

      If you’re unsure about investing, this $55 OpenAI-backed tool simplifies everything

      January 3, 2026

      This 130-inch OLED TV sticks to a wall with suction tech

      January 3, 2026

      Wyze Solar Cam Pan review: Pan/tilt security powered by the sun

      January 3, 2026

      Prices for an old Star Wars game have ballooned because of its role in a PS5 jailbreak

      January 3, 2026

      How to watch Samsung’s ‘First Look’ CES 2026 presentation on Sunday

      January 3, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Microsoft Entra ID flaw allowed hijacking any company’s tenant
    Technology

    Microsoft Entra ID flaw allowed hijacking any company’s tenant

    TechAiVerseBy TechAiVerseSeptember 22, 2025No Comments5 Mins Read1 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Microsoft Entra ID flaw allowed hijacking any company’s tenant
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Microsoft Entra ID flaw allowed hijacking any company’s tenant

    A critical combination of legacy components could have allowed complete access to the Microsoft Entra ID tenant of every company in the world.

    The fatal mix included undocumented tokens called “actor tokens” and a vulnerability in the Azure AD Graph API (CVE-2025-55241) that allowed the tokens to work with any organization’s Entra ID environment.

    A threat actor exploiting the issue would have had access to a slew of highly sensitive data without leaving any trace in the logs on the targeted environment, except for their own actions.

    Entra ID is Microsoft’s cloud-based identity and access management (IAM) service, formerly known as Azure Active Directory (Azure AD), which provides organizations with single sign-on, multi-factor authentication, and security controls across apps and resources.

    A dedicated Entra ID instance represents a single organization and manages secure access to all the apps used, both on-premise and cloud-based.

    This can include Microsoft 365 services, custom and third-party SaaS products like Salesforce, Dropbox, or cloud apps from Google, Amazon, or SAP.

    Security researcher Dirk-jan Mollema, founder of offensive security Outsider Security, discovered a token validation flaw that gave him Global Admin privileges in every Entra ID tenant.

    This level of access allows full tenant compromise and opens the door to any service authenticated through Entra ID.

    Impersonating any user in the tenant

    In a technical blog post, Mollema explains that actor tokens are issued by a legacy service called Access Control Service, which “is used for authentication with SharePoint applications and also seems to be used by Microsoft internally.”

    The researcher found them while investigating hybrid Exchange setups. He noticed that Exchange would request them when communicating with other services on behalf of a user.

    “The Actor token allows it to ‘act’ as another user in the tenant when talking to Exchange Online, SharePoint and as it turns out the Azure AD Graph” – Dirk-jan Mollema

    Actor tokens are not signed, meaning they can be used to impersonate any user in the tenant, and have a 24-hour validity without the possibility of being revoked during this period.

    Mollema says that “this whole Actor token design is something that never should have existed,” because they lack the proper required security controls:

    • there are no logs when Actor tokens are issued
    • since these services can craft the unsigned impersonation tokens without talking to Entra ID, there are also no logs when they are created or used
    • they cannot be revoked within their 24-hour validity
    • they completely bypass any restrictions configured in Conditional Access
    • we have to rely on logging from the resource provider to even know these tokens were used in the tenant

    The researcher says that Microsoft relies on actor tokens internally for service-to-service communication and that the company plans to remove them.

    Microsoft calls them “high-privileged access (HPA)” that allows an application or service, “to impersonate other users without providing any proof of user context.

    While testing multiple ways to use an actor token, Mollema changed the tenant ID to one different from that generating the token, and sent it to the deprecated Azure AD Graph API (graph.windows.net), expecting an “access denied” message.

    Instead, the error the researcher saw indicated that the token was valid, but access was unauthorized because the identity of the user was not found in the tenant.

    Azure AD Graph error indicates that token is valid but user does not exist
    source: Dirk-jan Mollema

    Mollema tried again, this time with a valid user ID from the targeted tenant, and saw Azure AD Graph API return the requested data.

    “I tested this in a few more test tenants I had access to, to make sure I was not crazy, but I could indeed access data in other tenants, as long as I knew their tenant ID (which is public information) and the netId of a user in that tenant.”

    Using the same actor token, the researcher was able to impersonate the Global Administrator in the target tenant and perform all the actions associated with the role (e.g. manage and create users of different roles, modify configurations, reset passwords, add admins).

    Mollema highlights that none of the actions required for obtaining Global Admin privileges generated any logs in the victim tenant.

    From an attacker’s perspective, exploiting the issues would have been possible in a few steps, starting with generating the actor token from a tenant under their control:

    • Finding the tenant ID for the targeted environment can be done with public APIs based on the domain name
    • Finding a valid netId of a regular user in the target tenant
    • Crafting an impersonation token with the actor token from the attacker tenant using the tenant ID and netId of the user in the victim tenant
    • Listing all Global Admins in the tenant and their netId
    • Crafting an impersonation token for the Global Admin
    • Performing any read/write action through the Azure AD Graph API

    Mollema notes that only activity in the last step would be recorded in the victim tenant.

    It is important to note that Microsoft started the deprecation process for the Azure AD Graph API service in September last year.

    In late June, the company warned that apps configured for extended access but still used Azure AD Graph would no longer be able to use the APIs starting early September 2025.

    Mollema reported the issues to Microsoft on July 14 and the company confirmed that the problem was resolved nine days later.

    On September 4, Microsoft also patched CVE-2025-55241, describing it as a critical privilege escalation vulnerability in Azure Entra.


    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleCan Solar Panels Replace A Home Generator? Here’s What You Need To Know
    Next Article Verified Steam game steals streamer’s cancer treatment donations
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    If you’re unsure about investing, this $55 OpenAI-backed tool simplifies everything

    January 3, 2026

    This 130-inch OLED TV sticks to a wall with suction tech

    January 3, 2026

    Wyze Solar Cam Pan review: Pan/tilt security powered by the sun

    January 3, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025574 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025213 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025118 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025103 Views
    Don't Miss
    Gadgets January 3, 2026

    Clicks Communicator announced: the modern answer to a classic BlackBerry device

    Clicks Communicator announced: the modern answer to a classic BlackBerry device Clicks, the brand that’s…

    If you’re unsure about investing, this $55 OpenAI-backed tool simplifies everything

    This 130-inch OLED TV sticks to a wall with suction tech

    Wyze Solar Cam Pan review: Pan/tilt security powered by the sun

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Clicks Communicator announced: the modern answer to a classic BlackBerry device

    January 3, 20264 Views

    If you’re unsure about investing, this $55 OpenAI-backed tool simplifies everything

    January 3, 20261 Views

    This 130-inch OLED TV sticks to a wall with suction tech

    January 3, 20264 Views
    Most Popular

    What to Know and Where to Find Apple Intelligence Summaries on iPhone

    March 12, 20250 Views

    A Team of Female Founders Is Launching Cloud Security Tech That Could Overhaul AI Protection

    March 12, 20250 Views

    Senua’s Saga: Hellblade 2 leads BAFTA Game Awards 2025 nominations

    March 12, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.