Skip to content
Techzine Global
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Global
  • Techzine Netherlands
  • Techzine Belgium
  • Techzine TV
  • ICTMagazine Netherlands
  • ICTMagazine Belgium
Techzine » News » Security » Serious Azure Active Directory vulnerability resolved by Microsoft
2 min Security

Serious Azure Active Directory vulnerability resolved by Microsoft

Erik van KlinkenJune 21, 2023 12:07 pmJune 21, 2023
Serious Azure Active Directory vulnerability resolved by Microsoft

Microsoft has fixed an exploit in Azure Active Directory (AD) authentication. The vulnerability allowed intruders to escalate account privileges and control the entire account.

Organizations deploy Azure AD to control user access. Examples include providing the backend for Office 365 users or centralising authentication between on-prem and cloud-based environments.

nOAuth

The misconfiguration has been called nOAuth by Descope, the party that discovered the vulnerability. AD OAuth applications that use email claims to generate access tokens are at risk. The process for exploitation sounds as simple as it is worrisome. A threat actor’s Azure AD admin account need only have a target’s email address for reference to log into a vulnerable application. From then on, privileges can be escalated, including lateral movement within the affected environment.

In a blog, Descope identifies where things went wrong with Azure AD’s configuration. The email claim is mutable and does not require authentication to count as an identifier. Microsoft already discouraged users from using email for login, according to Descope.

Vulnerable

Descope does not name the targets by name, but speaks of “several major applications” that were exploited. This included a design app with millions of monthly users, a publicly traded customer experience company and a multi-cloud consulting firm. Administrators of vulnerable applications can turn to Descope’s “Suggested remediation steps” for help.

Given Azure AD’s massive market share within the identity and access management world (27.53 percent according to 6sense), such a vulnerability could potentially do a considerable amount of damage. However, Microsoft has already contacted vulnerable parties behind the scenes after it received word from Descope about the exploit on April 11.

Also read: Microsoft Bing penetrated through misconfiguration in Azure Active Directory

Tags:

account privileges / Azure Active Directory / vulnerability

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Stay tuned, subscribe!

Nieuwsbrieven*

Related

Microsoft scales up Azure Local to a sovereign cloud, or does it?

Microsoft’s Azure Maia chief on the complex future of AI compute

Microsoft Azure Local, 365 Local generally available: the cloud, offline

CISA warns of active exploitation of critical SolarWinds vulnerability

Editor picks

UiPath CEO: Agentic AI shifts the definition of a software builder

With a CEO who positively likes to call software automation services ...

Anthropic allows partners to share findings from Mythos

Anthropic allows Project Glasswing partners to share findings from th...

The UI is dead, long live the agent: ServiceNow goes headless and opens its platform

Door is open to third-party agents

Google Search’s biggest update in 25 years: what’s changing?

At its I/O 2026 developer conference, Google announced a major overha...

Techzine.tv

NetApp balances sovereignty with AI infrastructure needs

NetApp balances sovereignty with AI infrastructure needs

ServiceNow unveils Action Fabric AI platform architecture

ServiceNow unveils Action Fabric AI platform architecture

How Linkerd brings simplicity to service mesh and AI security

How Linkerd brings simplicity to service mesh and AI security

Discover how edge AI transforms manufacturing with private 5G

Discover how edge AI transforms manufacturing with private 5G

Read more on Security

Akamai acquires LayerX for browser-native AI-era workforce controls
Top story

Akamai acquires LayerX for browser-native AI-era workforce controls

Akamai is a cloud cybersecurity company that dedicates itself to the provision of what it calls “superior t...

Adrian Bridgwater May 18, 2026
Police take First VPN offline after five-year investigation

Police take First VPN offline after five-year investigation

The Dutch and French police, in collaboration with Europol, have taken the VPN service First VPN offline. Thi...

Erik van Klinken 6 hours ago
No Mythos, no problem: commodity AI can squash bugs too
Top story

No Mythos, no problem: commodity AI can squash bugs too

The latest and greatest AI models from Anthropic and OpenAI are apparently too dangerous to unleash upon the ...

Erik van Klinken 1 day ago
IGEL and Zscaler unveil Zero Trust blueprints for healthcare security

IGEL and Zscaler unveil Zero Trust blueprints for healthcare security

IGEL and Zscaler have presented three joint healthcare security blueprints. They provide architectural guidel...

Berry Zwets 2 hours ago

Expert Talks

Power critical workloads with all-NVMe active-active storage for non-stop enterprise operations 

Power critical workloads with all-NVMe active-active storage for non-stop enterprise operations 

Enterprise infrastructure has reached a turning point where planned d...

Five tips for embracing continuous deployment as a DevOps mindset

Five tips for embracing continuous deployment as a DevOps mindset

Continuous deployment offers quicker releases and better software, bu...

The only thing constant in technology is change, except for unrealistic hopefulness

If anyone was ever forced to pick the tritest phrase in the world, it...

mnemonic opens Dutch Security Operations Centre (SOC) and relocates to new office in Utrecht

The new SOC in the Netherlands further strengthens mnemonic’s regio...

Tech calendar

Infosecurity Europe

June 2, 2026 London

.NEXT On Tour Amsterdam

June 9, 2026 Amsterdam

Oxygenate

June 11, 2026 Hilversum

VivaTech

June 17, 2026 Paris Expo Porte de Versailles 1 Place de la Porte de Versailles Pavillon 7 F-75015 Paris France

GITEX AI EUROPE 2026

June 30, 2026 Messe Berlin Exhibition Center, South Entrance

GOTO Copenhagen 2026

September 28, 2026 TAP1, Raffinaderivej 10, 2300 København S, Denmark

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2026 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement