Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Azure API Management Flaw Enables Cross-Tenant Account Creation, Bypassing Admin Restrictions

Posted on December 1, 2025December 1, 2025 By CWS

A important safety vulnerability in Microsoft Azure API Administration (APIM) Developer Portal permits attackers to register accounts throughout totally different tenant situations, even when directors have explicitly disabled person signup by means of the portal interface.

The flaw, which Microsoft has categorized as “by design,” stays unpatched as of December 1, 2025, leaving organizations doubtlessly uncovered to unauthorized entry.​

The safety challenge stems from a elementary design flaw the place disabling signup within the Azure Portal UI solely hides the registration type visually, whereas the underlying /signup API endpoint stays totally lively and accessible.

When Fundamental Authentication is configured for the Developer Portal, the backend API continues to just accept registration requests with out validating tenant boundaries or verifying that the request originates from a certified supply.​

Microsoft Azure API Administration Flaw

Attackers exploit this vulnerability by manipulating the Host header in signup requests. The assault requires entry to any APIM occasion with signup enabled, together with one managed by the attacker, the place they’ll intercept a reliable signup request, modify the Host header to level to a goal group’s APIM occasion, and efficiently create an account regardless of signup being “disabled” on the sufferer’s portal.​

The vulnerability permits a number of important safety dangers, together with cross-tenant account creation on any APIM occasion with Fundamental Authentication enabled, full bypass of administrative entry controls, and potential publicity of delicate API documentation and subscription keys. Organizations that believed they’d disabled public registration might unknowingly stay weak to this assault vector.​

APIM situations are weak if Fundamental Authentication is configured (no matter UI settings), the Developer Portal is deployed and accessible, and the service runs on Developer, Fundamental, Customary, or Premium tiers. The vulnerability has been assigned a CVSS rating of 6.5, categorized as medium-high severity beneath CWE-284 (Improper Entry Management).​

Finnish safety researcher Mihalis Haatainen of Bountyy Oy found the vulnerability on September 30, 2025, and instantly reported it to Microsoft Safety Response Middle (MSRC).

After submitting two detailed reviews in September and November, Microsoft closed each circumstances, stating the habits was “by design” and didn’t represent a safety vulnerability. The researcher subsequently reported the problem to CERT-FI earlier than publicly disclosing it on November 26, 2025.​

Since Microsoft has not launched a patch, organizations should take speedy motion to guard their APIM situations. Essentially the most important step is totally eradicating the Fundamental Authentication id supplier from the Azure Portal, not merely disabling signup within the UI.

Organizations ought to navigate to their APIM occasion, entry Developer Portal settings beneath Identities, and delete the “Username and password” id supplier solely.​

Further protecting measures embody switching completely to Azure Lively Listing authentication to implement correct tenant boundaries, auditing all current Developer Portal person accounts for unauthorized registrations created after signup was supposedly disabled, and implementing steady monitoring of signup exercise and API calls.

Safety groups can use the publicly out there Python verification script and Nuclei template launched by the researcher to determine weak situations inside their organizations.​

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Account, Admin, API, Azure, Bypassing, Creation, CrossTenant, Enables, Flaw, Management, Microsoft, Restrictions

Post navigation

Previous Post: New Albiriox Android Malware Developed by Russian Cybercriminals
Next Post: $29 Million Worth of Bitcoin Seized in Cryptomixer Takedown

Related Posts

CISA Warns of Threat Actors Leveraging Commercial Spyware to Target Users of Signal and WhatsApp Cyber Security News
Google Chrome May Soon Turn Webpages Into Podcasts With AI Audio Overviews Cyber Security News
CISA Warns of VMware Tools and Aria Operations 0-Day Vulnerability Exploited in Attacks Cyber Security News
Russian Fake-News Network CopyCop Added 200+ New Websites to Targets US, Canada and France Cyber Security News
First-ever AI-powered ‘MalTerminal’ Malware uses OpenAI GPT-4 to Generate Ransomware Code Cyber Security News
New Windows-Based Airstalk Malware Employs Multi-Threaded C2 Communication to Steal Logins Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Marquis Data Breach Impacts Over 780,000 People
  • Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens
  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Marquis Data Breach Impacts Over 780,000 People
  • Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens
  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark