Skip to content
Techzine Global
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Global
  • Techzine Netherlands
  • Techzine Belgium
  • Techzine TV
  • ICTMagazine Netherlands
  • ICTMagazine Belgium
Techzine » News » Security » Serious Azure Active Directory vulnerability resolved by Microsoft
2 min Security

Serious Azure Active Directory vulnerability resolved by Microsoft

Erik van KlinkenJune 21, 2023 12:07 pmJune 21, 2023
Serious Azure Active Directory vulnerability resolved by Microsoft

Microsoft has fixed an exploit in Azure Active Directory (AD) authentication. The vulnerability allowed intruders to escalate account privileges and control the entire account.

Organizations deploy Azure AD to control user access. Examples include providing the backend for Office 365 users or centralising authentication between on-prem and cloud-based environments.

nOAuth

The misconfiguration has been called nOAuth by Descope, the party that discovered the vulnerability. AD OAuth applications that use email claims to generate access tokens are at risk. The process for exploitation sounds as simple as it is worrisome. A threat actor’s Azure AD admin account need only have a target’s email address for reference to log into a vulnerable application. From then on, privileges can be escalated, including lateral movement within the affected environment.

In a blog, Descope identifies where things went wrong with Azure AD’s configuration. The email claim is mutable and does not require authentication to count as an identifier. Microsoft already discouraged users from using email for login, according to Descope.

Vulnerable

Descope does not name the targets by name, but speaks of “several major applications” that were exploited. This included a design app with millions of monthly users, a publicly traded customer experience company and a multi-cloud consulting firm. Administrators of vulnerable applications can turn to Descope’s “Suggested remediation steps” for help.

Given Azure AD’s massive market share within the identity and access management world (27.53 percent according to 6sense), such a vulnerability could potentially do a considerable amount of damage. However, Microsoft has already contacted vulnerable parties behind the scenes after it received word from Descope about the exploit on April 11.

Also read: Microsoft Bing penetrated through misconfiguration in Azure Active Directory

Tags:

account privileges / Azure Active Directory / vulnerability

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Stay tuned, subscribe!

Nieuwsbrieven*

Related

Microsoft scales up Azure Local to a sovereign cloud, or does it?

Microsoft’s Azure Maia chief on the complex future of AI compute

Microsoft Azure Local, 365 Local generally available: the cloud, offline

CISA warns of active exploitation of critical SolarWinds vulnerability

Editor picks

WSO2 defines identity, governance & scale for AI agents

Agentic AI management has come to the fore as one of the primary capa...

Edge AI and private 5G are made for each other

Edge AI and private 5G are becoming essential infrastructure for manu...

ServiceNow expands autonomous workforce to nearly all business roles

At Knowledge 2026, ServiceNow is introducing a new series of AI speci...

SAP makes a double play in data and AI with acquisitions of Prior Labs and Dremio

SAP announces two acquisitions: AI research lab Prior Labs and data l...

Techzine.tv

How JFrog secures binaries in the age of AI coding assistants

How JFrog secures binaries in the age of AI coding assistants

Your network isn't ready for AI: Here's what needs to change

Your network isn't ready for AI: Here's what needs to change

Cisco doubled down on compute for the AI and edge era

Cisco doubled down on compute for the AI and edge era

Discover how edge AI transforms manufacturing with private 5G

Discover how edge AI transforms manufacturing with private 5G

Read more on Security

Security by Design prevents higher bills
Top story

Security by Design prevents higher bills

Those who build in security only after the fact pay up to fifteen times the original cost. That’s why a str...

Berry Zwets April 16, 2026
NTT Research wants to accelerate innovation with Scale Academy: SaltGrain is the first result
Top story

NTT Research wants to accelerate innovation with Scale Academy: SaltGrain is the first result

Attribute-based encryption at the data layer

Sander Almekinders April 15, 2026
Object First Launches Fleet Manager for Remote Backup Management

Object First Launches Fleet Manager for Remote Backup Management

Object First has announced Fleet Manager. It is a service designed for companies with a distributed backup in...

Erik van Klinken 2 hours ago
Infoblox completes acquisition of Axur to address external threats

Infoblox completes acquisition of Axur to address external threats

Infoblox has completed the acquisition of Axur. With this move, the DNS company is adding protection against ...

Berry Zwets 1 day ago

Expert Talks

The only thing constant in technology is change, except for unrealistic hopefulness

The only thing constant in technology is change, except for unrealistic hopefulness

If anyone was ever forced to pick the tritest phrase in the world, it...

mnemonic opens Dutch Security Operations Centre (SOC) and relocates to new office in Utrecht

mnemonic opens Dutch Security Operations Centre (SOC) and relocates to new office in Utrecht

The new SOC in the Netherlands further strengthens mnemonic’s regio...

AI governance: the invisible prerequisite for success

When AI never gets past the demo

Agentic AI is reshaping the network – and it’s time to upgrade

Wireless connectivity is becoming a critical infrastructure for the A...

Tech calendar

Red Hat Summit

May 11, 2026 Atlanta

DevOpsCon London

May 11, 2026 London

Digitale soevereiniteit in de boardroom

May 11, 2026 Maarssen

Infosecurity Europe

June 2, 2026 London

Oxygenate

June 11, 2026 Hilversum

VivaTech

June 17, 2026 Paris Expo Porte de Versailles 1 Place de la Porte de Versailles Pavillon 7 F-75015 Paris France

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2026 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement