Skip to content
Techzine Global
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Global
  • Techzine Netherlands
  • Techzine Belgium
  • Techzine TV
  • ICTMagazine Netherlands
  • ICTMagazine Belgium
Techzine » News » Security » Serious Azure Active Directory vulnerability resolved by Microsoft
2 min Security

Serious Azure Active Directory vulnerability resolved by Microsoft

Erik van KlinkenJune 21, 2023 12:07 pmJune 21, 2023
Serious Azure Active Directory vulnerability resolved by Microsoft

Microsoft has fixed an exploit in Azure Active Directory (AD) authentication. The vulnerability allowed intruders to escalate account privileges and control the entire account.

Organizations deploy Azure AD to control user access. Examples include providing the backend for Office 365 users or centralising authentication between on-prem and cloud-based environments.

nOAuth

The misconfiguration has been called nOAuth by Descope, the party that discovered the vulnerability. AD OAuth applications that use email claims to generate access tokens are at risk. The process for exploitation sounds as simple as it is worrisome. A threat actor’s Azure AD admin account need only have a target’s email address for reference to log into a vulnerable application. From then on, privileges can be escalated, including lateral movement within the affected environment.

In a blog, Descope identifies where things went wrong with Azure AD’s configuration. The email claim is mutable and does not require authentication to count as an identifier. Microsoft already discouraged users from using email for login, according to Descope.

Vulnerable

Descope does not name the targets by name, but speaks of “several major applications” that were exploited. This included a design app with millions of monthly users, a publicly traded customer experience company and a multi-cloud consulting firm. Administrators of vulnerable applications can turn to Descope’s “Suggested remediation steps” for help.

Given Azure AD’s massive market share within the identity and access management world (27.53 percent according to 6sense), such a vulnerability could potentially do a considerable amount of damage. However, Microsoft has already contacted vulnerable parties behind the scenes after it received word from Descope about the exploit on April 11.

Also read: Microsoft Bing penetrated through misconfiguration in Azure Active Directory

Tags:

account privileges / Azure Active Directory / vulnerability

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Stay tuned, subscribe!

Nieuwsbrieven*

Related

Microsoft moves GitHub to Azure servers

Microsoft intervenes in Israeli defense use of Azure

Over 21,000 Citrix systems vulnerable to active attacks

SharePoint vulnerability actively exploited: Microsoft rolls out emergency patches

Editor picks

Nadella positions Microsoft as the AI do-it-all company

In his annual letter to Microsoft staff, investors and customers, Sat...

Axis Communications builds cyber wall around popular IoT devices

Securing IoT devices must be a top priority from start to finish thes...

How data centers are making the giant leap to 1 megawatt per rack

The electrical appetite of data centers is almost insatiable. A singl...

Women in tech: what are the challenges and how to overcome them?

Although technology is becoming increasingly central to our society, ...

Techzine.tv

Nutanix CTO explains their VMware alternative and multi-cloud strategy

Nutanix CTO explains their VMware alternative and multi-cloud strategy

SAP's AI migration tools from ECC to S/4HANA: faster and cheaper ERP transitions

SAP's AI migration tools from ECC to S/4HANA: faster and cheaper ERP transitions

Infor's industry-specific ERP strategy and Velocity Suite deep dive

Infor's industry-specific ERP strategy and Velocity Suite deep dive

From MSP to MIP: Pax8's vision for Managed Intelligence Providers

From MSP to MIP: Pax8's vision for Managed Intelligence Providers

Read more on Security

HP withdraws OneAgent update after problem with Microsoft Entra ID

HP withdraws OneAgent update after problem with Microsoft Entra ID

HP withdrew an update to its OneAgent software for Windows 11 after it was found to cause serious authenticat...

Mels Dees 1 day ago
Axis Communications builds cyber wall around popular IoT devices
Top story

Axis Communications builds cyber wall around popular IoT devices

Securing IoT devices must be a top priority from start to finish these days. Whereas the issue used to be see...

Berry Zwets 2 days ago
Darktrace links network and endpoint with NEXT agent

Darktrace links network and endpoint with NEXT agent

Darktrace is expanding its ActiveAI Security Platform with new features. These are designed to provide greate...

Mels Dees 1 day ago
The state of security in 2025
Top story

The state of security in 2025

The security landscape is changing rapidly. Whereas IT security used to be a topic exclusive to technicians, ...

Erik van Klinken October 22, 2025

Expert Talks

Three Ways Secure Modern Networks Unlock the True Power of AI

Three Ways Secure Modern Networks Unlock the True Power of AI

AI is rapidly becoming the main driver of innovation for businesses, ...

Data Governance in the Cloud: Balancing Innovation and Regulation

Data Governance in the Cloud: Balancing Innovation and Regulation

The cloud has become the backbone of modern business, enabling rapid ...

How to Safeguard and Prepare Exchange Server against Natural Disasters?

It is critical to make sure that the Exchange Server is protected fro...

Minimizing liability is not the same as security: Lessons learned from Collin’s Aerospace cyberattack

Key points: A ransomware attack targeting the ARINC vMUSE syste...

Tech calendar

Synology Solution Day 2025

October 30, 2025 Amsterdam

Dell Technologies Forum

November 13, 2025 Nieuwegein

BrickCon The Databricks Community Conference

December 3, 2025 Orlando, Florida

Appdevcon

March 10, 2026 Amsterdam

Webdevcon

March 10, 2026 Amsterdam

Dutch PHP Conference

March 10, 2026 Amsterdam

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2025 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement