Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Discord Ends Persona Age Verification Trial Amid Privacy Backlash

    February 27, 2026

    OpenAI’s Stargate Data Center Ambitions Hit Major Roadblocks

    February 27, 2026

    Panasonic Strikes Partnership to Reclaim TV Market Share in the West

    February 26, 2026
    Facebook X (Twitter) Instagram
    • Tech
    • AI
    • Get In Touch
    Facebook X (Twitter) LinkedIn
    TallwireTallwire
    • Tech

      OpenAI’s Stargate Data Center Ambitions Hit Major Roadblocks

      February 27, 2026

      Large Hadron Collider Enters Third Shutdown For Major Upgrade

      February 26, 2026

      Stellantis Faces Massive Losses and Strategic Shift After Misjudging EV Market Demand

      February 26, 2026

      AI’s Persistent PDF Parsing Failure Stalls Practical Use

      February 26, 2026

      Solid-State Battery Claims Put to the Test With Record Fast Charging Results

      February 26, 2026
    • AI

      OpenAI’s Stargate Data Center Ambitions Hit Major Roadblocks

      February 27, 2026

      Anthropic Raises Alarm Over Chinese AI Model Distillation Practices

      February 26, 2026

      AI’s Persistent PDF Parsing Failure Stalls Practical Use

      February 26, 2026

      Tech Firms Push “Friendlier” Robot Designs to Boost Human Acceptance

      February 26, 2026

      Samsung Expands Galaxy AI With Perplexity Integration for Upcoming S26 Series

      February 25, 2026
    • Security

      Discord Ends Persona Age Verification Trial Amid Privacy Backlash

      February 27, 2026

      FBI Issues Alert on Outdated Wi-Fi Routers Vulnerable to Cyber Attacks

      February 25, 2026

      Wikipedia Blacklists Archive.Today After DDoS Abuse And Content Manipulation

      February 24, 2026

      Admissions Website Bug Exposed Children’s Personal Information

      February 23, 2026

      FBI Warns ATM Jackpotting Attacks on the Rise, Costing Hackers Millions in Stolen Cash

      February 22, 2026
    • Health

      Social Media Addiction Trial Draws Grieving Parents Seeking Accountability From Tech Platforms

      February 19, 2026

      Portugal’s Parliament OKs Law to Restrict Children’s Social Media Access With Parental Consent

      February 18, 2026

      Parents Paint 108 Names, Demand Snapchat Reform After Deadly Fentanyl Claims

      February 18, 2026

      UK Kids Turning to AI Chatbots and Acting on Advice at Alarming Rates

      February 16, 2026

      Landmark California Trial Sees YouTube Defend Itself, Rejects ‘Social Media’ and Addiction Claims

      February 16, 2026
    • Science

      Large Hadron Collider Enters Third Shutdown For Major Upgrade

      February 26, 2026

      Google Phases Out Android’s Built-In Weather App, Replacing It With Search-Based Forecasts

      February 25, 2026

      Microsoft’s Breakthrough Suggests Data Could Be Preserved for 10,000 Years on Glass

      February 24, 2026

      NASA Trials Autonomous, AI-Planned Driving on Mars Rover

      February 20, 2026

      XAI Publicly Unveils Elon Musk’s Interplanetary AI Vision In Rare All-Hands Release

      February 14, 2026
    • Tech

      Zuckerberg Testifies In Landmark Trial Over Alleged Teen Social Media Harms

      February 23, 2026

      Gay Tech Networks Under Spotlight In Silicon Valley Culture Debate

      February 23, 2026

      Google Co-Founder’s Epstein Contacts Reignite Scrutiny of Elite Tech Circles

      February 7, 2026

      Bill Gates Denies “Absolutely Absurd” Claims in Newly Released Epstein Files

      February 6, 2026

      Informant Claims Epstein Employed Personal Hacker With Zero-Day Skills

      February 5, 2026
    TallwireTallwire
    Home»Tech»Microsoft Patches Catastrophic Entra ID ‘Actor Token’ Flaw That Could’ve Let Attackers Own Any Tenant
    Tech

    Microsoft Patches Catastrophic Entra ID ‘Actor Token’ Flaw That Could’ve Let Attackers Own Any Tenant

    Updated:February 21, 20264 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Microsoft Patches Catastrophic Entra ID ‘Actor Token’ Flaw That Could’ve Let Attackers Own Any Tenant
    Microsoft Patches Catastrophic Entra ID ‘Actor Token’ Flaw That Could’ve Let Attackers Own Any Tenant
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A newly disclosed vulnerability in Microsoft‘s Entra ID (formerly Azure Active Directory), tracked as CVE-2025-55241, could have allowed a determined attacker to impersonate any user — including Global Administrators — across nearly all Entra ID tenants, by exploiting undocumented “Actor tokens” together with improper tenant validation in the legacy Azure AD Graph API. ☠️ Security researcher Dirk-jan Mollema described it as possibly “the most impactful Entra ID vulnerability” he’ll ever find, and demonstrated that the exploit would bypass conditional access, multi-factor authentication, and generate virtually no logs in the victim tenant. Microsoft patched the vulnerability in July 2025 (rolled widely by September) after receiving Mollema’s report, and initiated further mitigations including the disabling of actor-token requests to the Graph API. 

    Sources: IT Pro, Hacker News

    Key Takeaways

    – The flaw hinged on undocumented service-to-service “Actor tokens” that were exempt from security controls like MFA, logging, and conditional access, enabling cross-tenant impersonation. 

    – The legacy Azure AD Graph API’s weak tenant validation allowed an actor token from one tenant to be accepted in another, enabling privilege escalation across tenant boundaries. 

    – Microsoft responded rapidly (within days of disclosure) and deployed global fixes, while also urging customers to migrate off the deprecated Graph API and audit privileged roles. 

    In-Depth

    In the modern cloud world, identity systems like Microsoft’s Entra ID serve as foundational trust infrastructure: they authenticate users, grant permissions, and gate access to sensitive resources. So when there’s a flaw in that layer, anything built on top becomes vulnerable. That’s exactly what Dirk-jan Mollema discovered in mid-2025: a two-part design oversight involving “Actor tokens” and the outdated Azure AD Graph API allowed for cross-tenant impersonation that skipped nearly every security guardrail.

    First, the actor tokens. These tokens were undocumented internal tokens used by Microsoft services for service-to-service (S2S) operations. Because they were designed for internal use, they avoided many of the protections placed on standard user tokens: they could bypass conditional access rules, weren’t audited in standard logs in the target tenant, and weren’t subject to revocation or usual token checks. Mollema figured out how to request such an actor token from a “lab” or benign tenant and then use it in another tenant. 

    Here’s where the second flaw comes in: the legacy Azure AD Graph API (graph.windows.net) failed to properly validate the “originating tenant” claim in requests. In other words, the API didn’t reliably check whether the token presented actually belonged to the same tenant it was being used against. By combining an actor token from Tenant A with a crafted request to the Graph API of Tenant B (with knowledge of a user’s netId, which can be discovered via public APIs), an attacker could impersonate a user in Tenant B — including a Global Administrator. 

    Mollema walked through the full sequence in his blog: obtain the tenant ID (which is publicly retrievable), determine a user’s netId, forge an impersonation token based on that, list global admins, then forge a token for one of them, and finally carry out any directory-level change or access. Because Graph API is a powerful interface, once control was gained, the attacker could create or modify identities, escalate privileges, alter policies, or pivot into Microsoft 365 / Azure. 

    The worst part? Very little of this triggers alerts on the victim side. Actor token issuance and use doesn’t log metadata in the target tenant, and the Graph API itself has minimal telemetry in many deployments. So unless defenders had very detailed detection rules or a strong “assume breach / hunt mode,” the attack could proceed unobserved. 

    Once Mollema reported the flaw to Microsoft on July 14, work started quickly. Microsoft patched the flaw in the Graph API validation logic, began blocking actor token requests for Graph, and rolled updates across their cloud systems. The official CVE-2025-55241 was published on September 4, and analysts have rated it at the maximum severity (CVSS 10.0) in Microsoft’s own reporting. 

    Microsoft also used the episode to push more strongly on retiring the Azure AD Graph API (which is officially being phased out), urging developers to shift to the more modern Microsoft Graph, which has improved logging, stronger validation, and better security design. 

    So what does this mean for organizations and for cloud security in general? At a minimum, tenants should confirm that they have received Microsoft’s fixes, verify that no residual dependencies remain on the legacy Graph API, audit privileged roles and service accounts for anomalies, and adopt threat hunting practices targeted at anomalous token use or cross-tenant telegraphing. More broadly, this incident is a stark reminder that legacy internal components—even ones hidden from public documentation—can become attack vectors, and that identity-as-a-service (IdaaS) must never be treated as invulnerable. The trust boundary that identity providers enforce must be rigorously defended and audited.

    Microsoft
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleMicrosoft Makes Bold Move Toward AI Autonomy with First Home-Grown Models
    Next Article Microsoft PowerToys Adds Long-Overdue Automatic Light/Dark Theme Switcher and Shortcut Conflict Detector

    Related Posts

    OpenAI’s Stargate Data Center Ambitions Hit Major Roadblocks

    February 27, 2026

    Large Hadron Collider Enters Third Shutdown For Major Upgrade

    February 26, 2026

    Stellantis Faces Massive Losses and Strategic Shift After Misjudging EV Market Demand

    February 26, 2026

    AI’s Persistent PDF Parsing Failure Stalls Practical Use

    February 26, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    OpenAI’s Stargate Data Center Ambitions Hit Major Roadblocks

    February 27, 2026

    Large Hadron Collider Enters Third Shutdown For Major Upgrade

    February 26, 2026

    Stellantis Faces Massive Losses and Strategic Shift After Misjudging EV Market Demand

    February 26, 2026

    AI’s Persistent PDF Parsing Failure Stalls Practical Use

    February 26, 2026
    Top Reviews
    Tallwire
    Facebook X (Twitter) LinkedIn Threads Instagram RSS
    • Tech
    • Entertainment
    • Business
    • Government
    • Academia
    • Transportation
    • Legal
    • Press Kit
    © 2026 Tallwire. Optimized by ARMOUR Digital Marketing Agency.

    Type above and press Enter to search. Press Esc to cancel.