Close Menu
  • Home
  • Opinion
  • Region
    • Africa
    • Asia
    • Europe
    • Middle East
    • North America
    • Oceania
    • South America
  • AI & Machine Learning
  • Robotics & Automation
  • Space & Deep Tech
  • Web3 & Digital Economies
  • Climate & Sustainability Tech
  • Biotech & Future Health
  • Mobility & Smart Cities
  • Global Tech Pulse
  • Cybersecurity & Digital Rights
  • Future of Work & Education
  • Trend Radar & Startup Watch
  • Creator Economy & Culture
What's Hot

Spirit AI Open-Sources Spirit v1.5, Tops World Embodied AI Benchmark

January 12, 2026

Instagram reportedly fastened a problem referring to random password reset emails

January 12, 2026

Why MENA stood out in world enterprise in 2025

January 12, 2026
Facebook X (Twitter) Instagram LinkedIn RSS
NextTech NewsNextTech News
Facebook X (Twitter) Instagram LinkedIn RSS
  • Home
  • Africa
  • Asia
  • Europe
  • Middle East
  • North America
  • Oceania
  • South America
  • Opinion
Trending
  • Spirit AI Open-Sources Spirit v1.5, Tops World Embodied AI Benchmark
  • Instagram reportedly fastened a problem referring to random password reset emails
  • Why MENA stood out in world enterprise in 2025
  • How can change in local weather training put together younger folks for evolving careers?
  • How This Agentic Reminiscence Analysis Unifies Lengthy Time period and Quick Time period Reminiscence for LLM Brokers
  • Naver builds South Korea’s largest AI computing cluster with 4,000 Nvidia B200 GPUs
  • NCC bets on spectrum reform to shut the connectivity hole
  • UAE Climate Forecast: Decrease temperatures, sturdy winds and excessive sea tides will probably be witnessed throughout the UAE
Monday, January 12
NextTech NewsNextTech News
Home - Cybersecurity & Digital Rights - nOAuth Vulnerability Nonetheless Impacts 9% of Microsoft Entra SaaS Apps Two Years After Discovery
Cybersecurity & Digital Rights

nOAuth Vulnerability Nonetheless Impacts 9% of Microsoft Entra SaaS Apps Two Years After Discovery

NextTechBy NextTechJune 26, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email Copy Link
Follow Us
Google News Flipboard
nOAuth Vulnerability Nonetheless Impacts 9% of Microsoft Entra SaaS Apps Two Years After Discovery
Share
Facebook Twitter LinkedIn Pinterest Email


Jun 25, 2025Ravie LakshmananSaaS Safety / Vulnerability

New analysis has uncovered continued threat from a recognized safety weak point in Microsoft’s Entra ID, doubtlessly enabling malicious actors to realize account takeovers in inclined software-as-a-service (SaaS) purposes.

Id safety firm Semperis, in an evaluation of 104 SaaS purposes, discovered 9 of them to be weak to Entra ID cross-tenant nOAuth abuse.

First disclosed by Descope in June 2023, nOAuth refers to a weak point in how SaaS purposes implement OpenID Join (OIDC), which refers to an authentication layer constructed atop OAuth to confirm a person’s identification.

The authentication implementation flaw primarily permits a foul actor to alter the mail attribute within the Entra ID account to that of a sufferer’s and benefit from the app’s “Log in with Microsoft” function to hijack that account.

Cybersecurity

The assault is trivial, however it additionally works as a result of Entra ID permits customers to have an unverified e mail tackle, opening the door to person impersonation throughout tenant boundaries.

It additionally exploits the truth that an app utilizing a number of identification suppliers (e.g., Google, Fb, or Microsoft) might inadvertently enable an attacker to check in to a goal person’s account just because the e-mail tackle is used as the only standards to uniquely determine customers and merge accounts.

Semperis’ menace mannequin focuses on a variant of nOAuth, particularly discovering purposes that enable for Entra ID cross-tenant entry. In different phrases, each the attacker and the sufferer are on two completely different Entra ID tenants.

“nOAuth abuse is a critical menace that many organizations could also be uncovered to,” Eric Woodruff, chief identification architect at Semperis, stated. “It is low effort, leaves nearly no hint and bypasses finish‑person protections.”

“An attacker that efficiently abuses nOAuth would give you the option not solely to achieve entry to the SaaS utility knowledge, but in addition doubtlessly to pivot into Microsoft 365 assets.”

Semperis stated it reported the findings to Microsoft in December 2024, prompting the Home windows maker to reiterate suggestions it gave again in 2023, coinciding with the general public disclosure of nOAuth. It additionally famous that distributors that don’t adjust to the rules threat getting their apps faraway from the Entra App Gallery.

Microsoft has additionally emphasised that using claims aside from topic identifier (known as the “sub” declare) to uniquely determine an finish person in OpenID Join is non-compliant.

“If an OpenID Join relying get together makes use of any different claims in a token in addition to a mix of the sub (topic) declare and the iss (issuer) declare as a main account identifier in OpenID Join, they’re breaking the contract of expectations between federated identification supplier and relying get together,” the corporate famous at the moment.

Mitigating nOAuth in the end rests within the palms of builders, who should correctly implement authentication to forestall account takeovers by creating a novel, immutable person identifier.

“nOAuth abuse exploits cross-tenant vulnerabilities and may result in SaaS utility knowledge exfiltration, persistence, and lateral motion,” the corporate stated. “The abuse is troublesome for purchasers of weak purposes to detect and unattainable for purchasers of weak purposes to defend in opposition to.”

Cybersecurity

The disclosure comes as Pattern Micro revealed that misconfigured or overly privileged containers in Kubernetes environments can be utilized to facilitate entry to delicate Amazon Net Providers (AWS) credentials, enabling attackers to conduct follow-on actions.

The cybersecurity firm stated attackers can exploit extreme privileges granted to containers utilizing strategies like packet sniffing of unencrypted HTTP visitors to entry plaintext credentials and API spoofing, which makes use of manipulated Community Interface Card (NIC) settings to intercept Authorization tokens and achieve elevated privileges.

session

“The findings […] spotlight important safety concerns when utilizing Amazon EKS Pod Id for simplifying AWS useful resource entry in Kubernetes environments,” safety researcher Jiri Gogela stated.

“These vulnerabilities underscore the significance of adhering to the precept of least privilege, guaranteeing container configurations are scoped appropriately, and minimizing alternatives for exploitation by malicious actors.”

Discovered this text attention-grabbing? Comply with us on Twitter  and LinkedIn to learn extra unique content material we put up.



Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
NextTech
  • Website

Related Posts

Anthropic Launches Claude AI for Healthcare with Safe Well being File Entry

January 12, 2026

n8n Warns of CVSS 10.0 RCE Vulnerability Affecting Self-Hosted and Cloud Variations

January 11, 2026

The State of Trusted Open Supply

January 11, 2026
Add A Comment
Leave A Reply Cancel Reply

Economy News

Spirit AI Open-Sources Spirit v1.5, Tops World Embodied AI Benchmark

By NextTechJanuary 12, 2026

January 12, 2026 — Spirit AI has formally open-sourced its self-developed VLA (Imaginative and prescient-Language-Motion)…

Instagram reportedly fastened a problem referring to random password reset emails

January 12, 2026

Why MENA stood out in world enterprise in 2025

January 12, 2026
Top Trending

Spirit AI Open-Sources Spirit v1.5, Tops World Embodied AI Benchmark

By NextTechJanuary 12, 2026

January 12, 2026 — Spirit AI has formally open-sourced its self-developed VLA…

Instagram reportedly fastened a problem referring to random password reset emails

By NextTechJanuary 12, 2026

Over the weekend, tons of individuals reported receiving seemingly random password-reset emails from…

Why MENA stood out in world enterprise in 2025

By NextTechJanuary 12, 2026

In 2025, enterprise capital returned to elements of the world exterior the…

Subscribe to News

Get the latest sports news from NewsSite about world, sports and politics.

NEXTTECH-LOGO
Facebook X (Twitter) Instagram YouTube

AI & Machine Learning

Robotics & Automation

Space & Deep Tech

Web3 & Digital Economies

Climate & Sustainability Tech

Biotech & Future Health

Mobility & Smart Cities

Global Tech Pulse

Cybersecurity & Digital Rights

Future of Work & Education

Creator Economy & Culture

Trend Radar & Startup Watch

News By Region

Africa

Asia

Europe

Middle East

North America

Oceania

South America

2025 © NextTech-News. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms Of Service
  • Advertise With Us
  • Write For Us
  • Submit Article & Press Release

Type above and press Enter to search. Press Esc to cancel.

Subscribe For Latest Updates

Sign up to best of Tech news, informed analysis and opinions on what matters to you.

Invalid email address
 We respect your inbox and never send spam. You can unsubscribe from our newsletter at any time.     
Thanks for subscribing!