Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Thousands of SaaS Apps Could Still Be Susceptible to nOAuth

Posted on June 25, 2025June 25, 2025 By CWS

New analysis suggests greater than 10,000 SaaS apps may stay weak to a nOAuth variant regardless of the essential situation being disclosed in June 2023.

nOAuth is finest described as an abuse methodology used to focus on a misconfiguration or poor improvement apply within the interface between SaaS apps and Entra ID. The SaaS person is the sufferer. 

It’s successfully inconceivable for a SaaS person to know whether or not it’s a nOAuth sufferer, and there aren’t any mitigation choices obtainable. The sufferer might have its personal intensive safety controls, however nOAuth takes place between SaaS and Entra past the view of any native safety. 

Towards the top of 2024, researchers at Semperis started taking a look at SaaS purposes included within the Microsoft Entra Gallery. The aim was to not repeat the Descope analysis, however to see if the nOAuth methodology could possibly be invoked through a cross-tenant method fairly than Descope’s a number of identification suppliers situation.

The researchers chosen 104 SaaS purposes from the Microsoft Entra Gallery. “Primarily, the goal (sufferer) buyer is a Microsoft buyer with an Entra ID tenant, and the attacker makes use of a unique Entra ID tenant to carry out the abuse,” they clarify. It really works. The SaaS software solely must help Entra ID for authentication to be vulnerable to nOAuth – and whereas many apps might have adopted recommendation to shut the door detected by Descope (involving a number of identification suppliers), comparatively few are even conscious that solely the Entra ID is critical to invoke nOAuth. 

“The main target of the analysis from Descope was on account merging flows – for instance, if the SaaS software supported Google and Microsoft (Entra ID). In our analysis, we discovered that the identical form of abuse can exist even when the appliance is just utilizing Entra ID, and the appliance is just trying on the e mail declare,” explains Eric Woodruff, Senior Safety Researcher at Semperis. 

He continued, “Many builders may have learn the Descope analysis and thought, ‘This doesn’t apply to us’. There was additionally some inaccurate reporting at the moment, saying nOAuth was ‘mounted’. The headlines would make you imagine that Microsoft did one thing to resolve it throughout the board.”

It wasn’t mounted. Microsoft supplied recommendation on the way to correctly configure Entra ID. nOAuth will be prevented however it can’t be mounted.Commercial. Scroll to proceed studying.

From the 104 apps it investigated, Semperis discovered that 9 have been weak to nOAuth (roughly 9%). It’s troublesome to understand how these outcomes would possibly translate throughout the entire SaaS ecosphere, however Woodruff feedback, “If there are, say, 44,000 SaaS firms, and a number of other of them have a number of merchandise, it wouldn’t be outrageous to imagine that there could possibly be 150,000 SaaS purposes on the market.”

From these examined, 9% have been weak. “So, if that was extrapolated out towards 150,000 purposes, it could be 13,500 that could possibly be weak.” Among the many weak SaaS purposes discovered by Semperis have been a human sources administration platform (probably full of PII), and different purposes that built-in again into Microsoft 365. Within the latter case, profitable nOAuth abuse would enable the attacker to entry the SaaS knowledge and probably to pivot into Microsoft 365 sources.

Semperis knowledgeable Microsoft of its analysis. It opened an MSRC case in December 2024 however acquired little response from MSRC – which closed the case with out offering particulars in April 2025. SecurityWeek has invited Microsoft to touch upon the Semperis analysis however has acquired no reply on the time of writing (if we get a response, will probably be included as an addendum to this text).

However this isn’t a problem that may be mounted by Microsoft – it’s basically an architectural drawback involving the authentication/authorization endpoint for all Entra tenants and the professional want for visitor accounts with an e mail handle, together with unverified e mail addresses. Microsoft has constructed a platform that if configured and applied appropriately is not going to be weak to nOAuth. 

That is the issue. Builders are all the time below strain to ship at velocity, and may simply misunderstand detailed directions and make false assumptions on what’s required. Particulars from the Semperis analysis counsel that is widespread.

Within the ultimate evaluation, nOAuth isn’t a vulnerability that may be mounted, however a misconfiguration that may be exploited. Microsoft can supply recommendation and directions on the way to do issues appropriately, however it can not drive builders to observe the foundations.

The underside line is that nOAuth continues, victims don’t know they’re victims, Microsoft can not repair the issue, and the builders, who alone can stop nOAuth, are thus far failing to take action.

Associated: TeamFiltration Abused in Entra ID Account Takeover Marketing campaign

Associated: OneDrive Offers Internet Apps Full Learn Entry to All Information

Associated: Descope Targets Buyer Identification Market with Large $53M Seed Spherical

Associated: Researchers Flag Account Takeover Flaw in Microsoft Azure AD OAuth Apps

Security Week News Tags:Apps, nOAuth, SaaS, Susceptible, Thousands

Post navigation

Previous Post: Citrix Bleed 2 Flaw Enables Token Theft; SAP GUI Flaws Risk Sensitive Data Exposure
Next Post: Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADC

Related Posts

Spiking Neural Networks: Brain-Inspired Chips That Could Keep Your Data Safe Security Week News
US Government Is Investigating Messages Impersonating Trump’s Chief of Staff, Susie Wiles Security Week News
Palo Alto Networks Patches Privilege Escalation Vulnerabilities Security Week News
iMessage Zero-Click Attacks Suspected in Targeting of High-Value EU, US Individuals Security Week News
Cityworks Zero-Day Exploited by Chinese Hackers in US Local Government Attacks Security Week News
Russian Hackers Bypass Gmail MFA with App Specific Password Ruse Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • nOAuth Vulnerability Still Affects 9% of Microsoft Entra SaaS Apps Two Years After Discovery
  • Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADC
  • Thousands of SaaS Apps Could Still Be Susceptible to nOAuth
  • Citrix Bleed 2 Flaw Enables Token Theft; SAP GUI Flaws Risk Sensitive Data Exposure
  • Microsoft Offers Free Windows 10 Extended Security Update Options as EOS Nears

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • nOAuth Vulnerability Still Affects 9% of Microsoft Entra SaaS Apps Two Years After Discovery
  • Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADC
  • Thousands of SaaS Apps Could Still Be Susceptible to nOAuth
  • Citrix Bleed 2 Flaw Enables Token Theft; SAP GUI Flaws Risk Sensitive Data Exposure
  • Microsoft Offers Free Windows 10 Extended Security Update Options as EOS Nears

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News