Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Entra ID Vulnerability Let Attackers Escalate Privileges

Microsoft Entra ID Vulnerability Let Attackers Escalate Privileges

Posted on July 18, 2025July 18, 2025 By CWS

A vital vulnerability in Microsoft Entra ID permits attackers to escalate privileges to the World Administrator position via the exploitation of first-party functions. 

The vulnerability, reported to Microsoft Safety Response Middle (MSRC) in January 2025, impacts organizations utilizing hybrid Energetic Listing environments with federated domains.

Key Takeaways1. Attackers with sure admin or app permissions can hijack the Workplace 365 Alternate On-line service principal.2. Attackers use the Area.ReadWrite.All so as to add a malicious federated area and forge SAML tokens.3. Microsoft categorized this threat as “anticipated habits”.

Microsoft Entra ID Vulnerability

Safety researchers at Datadog found that service principals (SPs) assigned the Cloud Utility Administrator position, Utility Administrator position, or Utility.ReadWrite.All permission can escalate their privileges by hijacking the built-in Workplace 365 Alternate On-line service principal (Shopper ID: 00000002-0000-0ff1-ce00-000000000000).

The vulnerability works by exploiting the Workplace 365 Alternate On-line SP’s Area.ReadWrite.All permission so as to add a brand new federated area to the tenant. 

Attackers can then forge SAML tokens as any hybrid tenant person synchronized between on-premises Energetic Listing (AD) and Entra ID, together with customers with World Administrator privileges.

Backdooring SPs

The assault leverages the consumer credentials grant move for authentication:

Federated Area Backdoor Approach

The privilege escalation follows a five-step course of involving federated area manipulation. 

Attackers first add a malicious area utilizing the Microsoft Graph API endpoint POST /v1.0/domains, then confirm it via DNS data. 

The vital step includes configuring federation settings through POST /v1.0/domains/{area}/federationConfiguration with a malicious certificates:

Malicious area seems as federated in Entra ID

This configuration permits attackers to forge SAML tokens with MFA claims, bypassing multi-factor authentication necessities whereas sustaining the looks of official authentication in sign-in logs.

Signal-in immediate as a World Administrator with solid SAML token

Microsoft’s Response 

Datadog reported this vulnerability to the Microsoft Safety Response Middle (MSRC) on January 14, 2025, initiating a months-long disclosure course of. 

Nonetheless, on Could 14, 2025, MSRC concluded that this “is just not a safety vulnerability however anticipated habits of the Utility Administrator position and its related permissions”.

Microsoft’s response emphasised that the state of affairs displays misconfiguration fairly than a safety bypass, stating that Utility Administrator roles inherently embody the flexibility to handle utility credentials and impersonate utility identities.

Enhance detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now 

Cyber Security News Tags:Attackers, Entra, Escalate, Microsoft, Privileges, Vulnerability

Post navigation

Previous Post: How to Prevent SIM Swap Attacks
Next Post: Settlement Reached in Investors’ Lawsuit Against Meta CEO Mark Zuckerberg and Other Company Leaders

Related Posts

Threat Actors Abuse Windows Run Prompt to Execute Malicious Command and Deploy DeerStealer Threat Actors Abuse Windows Run Prompt to Execute Malicious Command and Deploy DeerStealer Cyber Security News
Google’s reCAPTCHA Update Challenges Privacy Advocates Google’s reCAPTCHA Update Challenges Privacy Advocates Cyber Security News
APT-C-35 Infrastructure Activity Leveraged Using Apache HTTP Response Indicators APT-C-35 Infrastructure Activity Leveraged Using Apache HTTP Response Indicators Cyber Security News
Active Exploitation of Windows Defender Zero-Day Flaws Active Exploitation of Windows Defender Zero-Day Flaws Cyber Security News
OpenAI Unveils Codex Security for Software Vulnerabilities OpenAI Unveils Codex Security for Software Vulnerabilities Cyber Security News
New Nova Stealer Attacking macOS Users by Swapping Legitimate Apps to Steal Cryptocurrency Wallet Data New Nova Stealer Attacking macOS Users by Swapping Legitimate Apps to Steal Cryptocurrency Wallet Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark