Skip to content
Techzine Global
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Global
  • Techzine Netherlands
  • Techzine Belgium
  • Techzine TV
  • ICTMagazine Netherlands
  • ICTMagazine Belgium
Techzine » News » Security » Serious Azure Active Directory vulnerability resolved by Microsoft
2 min Security

Serious Azure Active Directory vulnerability resolved by Microsoft

Erik van KlinkenJune 21, 2023 12:07 pmJune 21, 2023
Serious Azure Active Directory vulnerability resolved by Microsoft

Microsoft has fixed an exploit in Azure Active Directory (AD) authentication. The vulnerability allowed intruders to escalate account privileges and control the entire account.

Organizations deploy Azure AD to control user access. Examples include providing the backend for Office 365 users or centralising authentication between on-prem and cloud-based environments.

nOAuth

The misconfiguration has been called nOAuth by Descope, the party that discovered the vulnerability. AD OAuth applications that use email claims to generate access tokens are at risk. The process for exploitation sounds as simple as it is worrisome. A threat actor’s Azure AD admin account need only have a target’s email address for reference to log into a vulnerable application. From then on, privileges can be escalated, including lateral movement within the affected environment.

In a blog, Descope identifies where things went wrong with Azure AD’s configuration. The email claim is mutable and does not require authentication to count as an identifier. Microsoft already discouraged users from using email for login, according to Descope.

Vulnerable

Descope does not name the targets by name, but speaks of “several major applications” that were exploited. This included a design app with millions of monthly users, a publicly traded customer experience company and a multi-cloud consulting firm. Administrators of vulnerable applications can turn to Descope’s “Suggested remediation steps” for help.

Given Azure AD’s massive market share within the identity and access management world (27.53 percent according to 6sense), such a vulnerability could potentially do a considerable amount of damage. However, Microsoft has already contacted vulnerable parties behind the scenes after it received word from Descope about the exploit on April 11.

Also read: Microsoft Bing penetrated through misconfiguration in Azure Active Directory

Tags:

account privileges / Azure Active Directory / vulnerability

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Stay tuned, subscribe!

Nieuwsbrieven*

Related

VAST Data brings AI Operating System to Microsoft Azure

Microsoft Azure thwarts largest cloud DDoS attack ever

FortiWeb vulnerability actively exploited to create admin accounts

Docker fixes serious vulnerabilities in Compose and Desktop Installer

Editor picks

Microsoft engineer says Windows isn’t being rewritten to Rust with AI

Update December 24: Galen Hunt, Distinguished Engineer at Microsoft, ...

Techzine.tv

Qualcomm tells us how ARM chips will disrupt the enterprise PC market

Qualcomm tells us how ARM chips will disrupt the enterprise PC market

In-depth conversation about Agentforce IT service and how it wants to change the ITSM market

In-depth conversation about Agentforce IT service and how it wants to change the ITSM market

Why SAP says best-of-breed software era is over

Why SAP says best-of-breed software era is over

Workday CTO outlines bold AI agent strategy and major acquisitions

Workday CTO outlines bold AI agent strategy and major acquisitions

Read more on Security

Why did so many security vendors abandon MITRE’s stresstest?
Top story

Why did so many security vendors abandon MITRE’s stresstest?

This year, MITRE made headlines primarily because its leading vulnerability database was in danger of being d...

Erik van Klinken December 12, 2025
Malicious Chrome extensions disguise themselves as proxy services

Malicious Chrome extensions disguise themselves as proxy services

Two Chrome extensions called "Phantom Shuttle" pretend to be proxy services, but in reality steal user data. ...

Erik van Klinken December 23, 2025
Data of 21,000 Nissan customers leaked via Red Hat

Data of 21,000 Nissan customers leaked via Red Hat

Nissan Motor Co. reported on Monday that the personal data of approximately 21,000 customers had been exposed...

Mels Dees December 23, 2025
Sophos CEO sees “cybersecurity poverty line”: what to do about it?
Top story

Sophos CEO sees “cybersecurity poverty line”: what to do about it?

We sit down with Sophos CEO Joe Levy during Pax8 Beyond to discuss, among other things, the progress of the S...

Sander Almekinders December 11, 2025

Expert Talks

Why specialized LLMs are the future of generativeAI

Why specialized LLMs are the future of generativeAI

ChatGPT and the other GenAI chatbots that have taken the tech world b...

The year of the AI agents: why 2026 is about value, not technology

The year of the AI agents: why 2026 is about value, not technology

Microsoft has declared 2026 to be the year of the agent. This is not ...

ARTPEC-9 and Axis Edge Vault: a unified hardware-rooted framework for cybersecure surveillance

As cyber threats grow in scale and complexity, protecting network-con...

How our team optimizes infrastructure for minimal AI video processing latency 

Over the past year, AI-generated video diffusion models have enabled ...

Tech calendar

Appdevcon

March 10, 2026 Amsterdam

Webdevcon

March 10, 2026 Amsterdam

Dutch PHP Conference

March 10, 2026 Amsterdam

GITEX ASIA 2026

April 8, 2026 Singapore

SAS Innovate 2026

April 27, 2026 Grapevine

Team '26

May 5, 2026 Anaheim

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2025 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement