Technology

Massive Security Flaw in Microsoft Entra ID Puts Every Company at Risk!

2025-09-21

Author: Michael

A Shocking Discovery in Microsoft Entra ID!

Imagine a security loophole so severe that it could potentially grant any hacker complete access to every Microsoft Entra ID tenant across the globe! A recent investigation has revealed a dangerous combination of undocumented 'actor tokens' and a critical vulnerability in the Azure AD Graph API, labeled CVE-2025-55241. This catastrophic mix allows malicious actors to infiltrate any organization’s Entra ID system without triggering alarms.

What Is Entra ID?

Entra ID, previously known as Azure Active Directory, is Microsoft's robust cloud-based identity and access management service. It provides organizations with essential security features like single sign-on and multi-factor authentication, safeguarding access to a variety of applications—ranging from Microsoft 365 to popular SaaS solutions like Salesforce and Dropbox.

The Shocking Vulnerability Explained!

Security expert Dirk-jan Mollema has unveiled a flaw allowing hackers to achieve Global Admin privileges across all Entra ID tenants. This access could lead to full tenant takeovers, enabling bad actors to exploit any service that uses Entra ID for authentication.

The Flaw Behind the Flaw!

Mollema's findings indicate that the actor tokens—issued by a legacy service known as the Access Control Service—are fundamentally insecure. These tokens, not being signed, can impersonate any user within the tenant and are valid for 24 hours without a revocation option. This design flaw leads to a lack of accountability, as there's no logging of token issuance or usage.

The Ease of Exploitation!

The researcher detailed a chillingly simple method for an attacker to exploit this vulnerability. By already controlling a tenant, an attacker could easily generate an actor token, find a target tenant ID using public information, and craft a token that impersonates any user or even a Global Admin in the targeted tenant. Alarmingly, these malicious actions would leave no trace in the victim’s logs—only the attacker's actions would be recorded!

What Is Microsoft Doing About It?

Following Mollema’s report on July 14, Microsoft confirmed that the issue was addressed within just nine days. However, the company had already initiated the deprecation of the Azure AD Graph API last September, announcing it would be fully disabled by early September 2025. As part of their commitment to security, Microsoft is working to phase out the insecure actor tokens that enabled this troubling flaw.

Final Thoughts: Is Your Company at Risk?

This revelation raises critical concerns for organizations relying on Microsoft’s identity management systems. With the potential for widespread compromise, it’s imperative for companies to stay informed and vigilant as Microsoft enhances security measures and phases out outdated components. Don’t wait until it’s too late—ensure your Entra ID environment is secured!