Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Entra ID Vulnerability Let Attackers Escalate Privileges

Microsoft Entra ID Vulnerability Let Attackers Escalate Privileges

Posted on July 18, 2025July 18, 2025 By CWS

A vital vulnerability in Microsoft Entra ID permits attackers to escalate privileges to the World Administrator position via the exploitation of first-party functions. 

The vulnerability, reported to Microsoft Safety Response Middle (MSRC) in January 2025, impacts organizations utilizing hybrid Energetic Listing environments with federated domains.

Key Takeaways1. Attackers with sure admin or app permissions can hijack the Workplace 365 Alternate On-line service principal.2. Attackers use the Area.ReadWrite.All so as to add a malicious federated area and forge SAML tokens.3. Microsoft categorized this threat as “anticipated habits”.

Microsoft Entra ID Vulnerability

Safety researchers at Datadog found that service principals (SPs) assigned the Cloud Utility Administrator position, Utility Administrator position, or Utility.ReadWrite.All permission can escalate their privileges by hijacking the built-in Workplace 365 Alternate On-line service principal (Shopper ID: 00000002-0000-0ff1-ce00-000000000000).

The vulnerability works by exploiting the Workplace 365 Alternate On-line SP’s Area.ReadWrite.All permission so as to add a brand new federated area to the tenant. 

Attackers can then forge SAML tokens as any hybrid tenant person synchronized between on-premises Energetic Listing (AD) and Entra ID, together with customers with World Administrator privileges.

Backdooring SPs

The assault leverages the consumer credentials grant move for authentication:

Federated Area Backdoor Approach

The privilege escalation follows a five-step course of involving federated area manipulation. 

Attackers first add a malicious area utilizing the Microsoft Graph API endpoint POST /v1.0/domains, then confirm it via DNS data. 

The vital step includes configuring federation settings through POST /v1.0/domains/{area}/federationConfiguration with a malicious certificates:

Malicious area seems as federated in Entra ID

This configuration permits attackers to forge SAML tokens with MFA claims, bypassing multi-factor authentication necessities whereas sustaining the looks of official authentication in sign-in logs.

Signal-in immediate as a World Administrator with solid SAML token

Microsoft’s Response 

Datadog reported this vulnerability to the Microsoft Safety Response Middle (MSRC) on January 14, 2025, initiating a months-long disclosure course of. 

Nonetheless, on Could 14, 2025, MSRC concluded that this “is just not a safety vulnerability however anticipated habits of the Utility Administrator position and its related permissions”.

Microsoft’s response emphasised that the state of affairs displays misconfiguration fairly than a safety bypass, stating that Utility Administrator roles inherently embody the flexibility to handle utility credentials and impersonate utility identities.

Enhance detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now 

Cyber Security News Tags:Attackers, Entra, Escalate, Microsoft, Privileges, Vulnerability

Post navigation

Previous Post: How to Prevent SIM Swap Attacks
Next Post: Settlement Reached in Investors’ Lawsuit Against Meta CEO Mark Zuckerberg and Other Company Leaders

Related Posts

CISA Adds Digiever Authorization Vulnerability to KEV List Following Active Exploitation CISA Adds Digiever Authorization Vulnerability to KEV List Following Active Exploitation Cyber Security News
Ni8mare Vulnerability Let Attackers Hijack n8n Servers Ni8mare Vulnerability Let Attackers Hijack n8n Servers Cyber Security News
Most SOCs See Attacks Too Late — How to Fix It Most SOCs See Attacks Too Late — How to Fix It Cyber Security News
BADBOX 2.0 Infected Over 1 Million Android Devices Worldwide BADBOX 2.0 Infected Over 1 Million Android Devices Worldwide Cyber Security News
MCDonald’s Free Nuggets Hack Leads to Expose of Confidential Data MCDonald’s Free Nuggets Hack Leads to Expose of Confidential Data Cyber Security News
AI Tools Like GPT Direct Users to Phishing Sites Instead of Legitimate Ones AI Tools Like GPT Direct Users to Phishing Sites Instead of Legitimate Ones Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark