9% of Microsoft Entra SaaS Apps Still Vulnerable to nOAuth Exploits Two Years Post-Discovery

June 25, 2025
SaaS Security / Vulnerability

Recent findings highlight ongoing risks associated with a known security flaw in Microsoft Entra ID, which may allow malicious actors to execute account takeovers in certain software-as-a-service (SaaS) applications. Identity security firm Semperis analyzed 104 SaaS applications and discovered that nine remain vulnerable to Entra ID cross-tenant nOAuth abuse. Initially revealed by Descope in June 2023, nOAuth pertains to a flaw in the implementation of OpenID Connect (OIDC) by SaaS applications, which is an authentication layer built on OAuth for verifying user identities. This implementation flaw allows attackers to alter the mail attribute in an Entra ID account to that of a target, leveraging the app’s “Log in with Microsoft” feature to hijack the account. The attack is straightforward, exacerbated by Entra ID’s allowance for unverified email addresses, paving the way for user impersonation.

nOAuth Vulnerability Persists in 9% of Microsoft Entra SaaS Applications Two Years After Initial Identification

June 25, 2025

Recent findings have revealed that a previously identified security vulnerability within Microsoft Entra ID continues to pose risks for certain software-as-a-service (SaaS) applications, potentially allowing malicious entities to exploit these weaknesses and gain unauthorized access to accounts. Research conducted by the identity security firm Semperis examined 104 SaaS applications, discovering that nine of them remain vulnerable to cross-tenant nOAuth exploitation.

First highlighted by Descope in June 2023, nOAuth represents an oversight in the implementation of the OpenID Connect (OIDC) authentication framework, which serves as a crucial layer on top of the OAuth protocol for user identification. The flaw allows attackers to manipulate the mail attribute associated with an Entra ID account, substituting it with that of a targeted victim. Consequently, this enables malicious actors to utilize the application’s “Log in with Microsoft” feature to illegally access and commandeer accounts.

The simplicity of this attack vector is alarming; it capitalizes on the fact that Entra ID allows users to connect accounts with unverified email addresses. This loophole presents an opportunity for user impersonation, a scenario that could lead to severe security breaches and unauthorized data access. Given the widespread adoption of SaaS solutions, the impact of such breaches can extend beyond individual accounts, potentially affecting the integrity of an organization’s entire digital infrastructure.

In terms of targeted demographics, the victims of this vulnerability are primarily users of the affected SaaS applications, which may span various sectors, including finance, healthcare, and technology. The persistence of this vulnerability underscores a critical concern for organizations relying on Microsoft Entra ID for identity and access management.

From a cybersecurity perspective, the tactics associated with this form of attack can be mapped to the MITRE ATT&CK framework, providing insights into the methods adversaries might use. Initial access through credential manipulation and persistence techniques via account hijacking are significant areas of concern. Once an attacker gains foothold, they may escalate privileges, allowing them to conduct further unauthorized actions within compromised environments.

Business owners and IT security professionals must remain vigilant and proactive in addressing these vulnerabilities. Regular assessments of existing security measures and timely updates in response to disclosed vulnerabilities are essential strategies for safeguarding sensitive data and protecting against potential exploits.

As investigations progress and remedial measures are put in place, it remains paramount for organizations to stay informed about emerging threats. Continued awareness can reduce the likelihood of falling victim to such vulnerabilities and stregthen overall cybersecurity defenses in an increasingly complex digital landscape.

Source link