Skip to content
Techzine Europe
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Europe
  • Techzine Netherlands
Techzine News Security Serious Azure Active Directory vulnerability resolved by Microsoft
2 min Security

Serious Azure Active Directory vulnerability resolved by Microsoft

Erik van KlinkenJune 21, 2023 12:07 pmJune 21, 2023
Serious Azure Active Directory vulnerability resolved by Microsoft

Microsoft has fixed an exploit in Azure Active Directory (AD) authentication. The vulnerability allowed intruders to escalate account privileges and control the entire account.

Organizations deploy Azure AD to control user access. Examples include providing the backend for Office 365 users or centralising authentication between on-prem and cloud-based environments.

nOAuth

The misconfiguration has been called nOAuth by Descope, the party that discovered the vulnerability. AD OAuth applications that use email claims to generate access tokens are at risk. The process for exploitation sounds as simple as it is worrisome. A threat actor’s Azure AD admin account need only have a target’s email address for reference to log into a vulnerable application. From then on, privileges can be escalated, including lateral movement within the affected environment.

In a blog, Descope identifies where things went wrong with Azure AD’s configuration. The email claim is mutable and does not require authentication to count as an identifier. Microsoft already discouraged users from using email for login, according to Descope.

Vulnerable

Descope does not name the targets by name, but speaks of “several major applications” that were exploited. This included a design app with millions of monthly users, a publicly traded customer experience company and a multi-cloud consulting firm. Administrators of vulnerable applications can turn to Descope’s “Suggested remediation steps” for help.

Given Azure AD’s massive market share within the identity and access management world (27.53 percent according to 6sense), such a vulnerability could potentially do a considerable amount of damage. However, Microsoft has already contacted vulnerable parties behind the scenes after it received word from Descope about the exploit on April 11.

Also read: Microsoft Bing penetrated through misconfiguration in Azure Active Directory

Tags:

account privileges / Azure Active Directory / vulnerability

"*" indicates required fields

Stay tuned, subscribe!

Nieuwsbrieven*
This field is for validation purposes and should be left unchanged.

Related

Exploit details of serious Cisco IOS XE vulnerability now public

Microsoft makes Azure AI Foundry available with improved model tools

Chrome vulnerability allowing account takeover fixed

Microsoft expands fine-tuning capabilities in Azure AI Foundry

Editor picks

What is HPE VME and is it a direct competitor to VMware’s hypervisor?

HPE hit the bullseye with VME

SAP CEO says EU doesn’t need a massive AI buildout. Is he right?

SAP CEO Christian Klein considers it unnecessary to implement a massi...

Ingram Micro hit by outage, being unavailable for almost a day

IT distributor Ingram Micro has been experiencing technical problems ...

Dutch Authority: Data theft via ransomware doubles in one year

In 2024, cybercriminals stole personal data almost twice as often as ...

Insight: RSAC 2025 Conference

A Ferrari needs brakes, innovation needs cybersecurity

Practical insights into managed security from the field

Rise of AI transforms CISO’s role: from technical to strategic input

Sam Curry, CISO at Zscaler talks strategy and (future) challenges

AI agents have identities too: how do we secure them?

AI agents have identities too: how do we secure them?

A conversations with Okta CSO David Bradbury

Cisco wants to use AI to defend AI at machine scale

Cisco wants to use AI to defend AI at machine scale

Cisco made a swath of announcements at RSAC 2025 Conference. Unsurpri...

Read more on Security

Ingram Micro hit by outage, being unavailable for almost a day

Ingram Micro hit by outage, being unavailable for almost a day

IT distributor Ingram Micro has been experiencing technical problems since 10 p.m. yesterday, rendering websi...

Berry Zwets 1 day ago
Hardcoded credentials in Cisco software give attackers root access

Hardcoded credentials in Cisco software give attackers root access

Patch available, no known exploitation

Erik van Klinken 1 day ago
IDE extensions threaten the software supply chain

IDE extensions threaten the software supply chain

Extensions in integrated development environments (IDEs) are useful tools that give developers more flexibili...

Erik van Klinken 2 days ago
A Ferrari needs brakes, innovation needs cybersecurity
Top story

A Ferrari needs brakes, innovation needs cybersecurity

Practical insights into managed security from the field

Sander Almekinders 3 days ago

Tech calendar

GITEX DIGI_HEALTH 5.0 - Thailand

September 10, 2025 BITEC Bangkok, Thailand

IT Arena

September 26, 2025 Lviv, Ukraine

Innovation Week 2025

October 9, 2025 Prague

Luxembourg Venture Days

October 22, 2025 Luxembourg

Appdevcon

March 10, 2026 Amsterdam

Webdevcon

March 10, 2026 Amsterdam

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2025 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement