By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: nOAuth Vulnerability Still Affects 9% of Microsoft Entra SaaS Apps Two Years After Discovery
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > nOAuth Vulnerability Still Affects 9% of Microsoft Entra SaaS Apps Two Years After Discovery
Computing

nOAuth Vulnerability Still Affects 9% of Microsoft Entra SaaS Apps Two Years After Discovery

News Room
Last updated: 2025/06/25 at 1:07 PM
News Room Published 25 June 2025
Share
SHARE

Jun 25, 2025Ravie LakshmananSaaS Security / Vulnerability

New research has uncovered continued risk from a known security weakness in Microsoft’s Entra ID, potentially enabling malicious actors to achieve account takeovers in susceptible software-as-a-service (SaaS) applications.

Identity security company Semperis, in an analysis of 104 SaaS applications, found nine of them to be vulnerable to Entra ID cross-tenant nOAuth abuse.

First disclosed by Descope in June 2023, nOAuth refers to a weakness in how SaaS applications implement OpenID Connect (OIDC), which refers to an authentication layer built atop OAuth to verify a user’s identity.

The authentication implementation flaw essentially allows a bad actor to change the mail attribute in the Entra ID account to that of a victim’s and take advantage of the app’s “Log in with Microsoft” feature to hijack that account.

Cybersecurity

The attack is trivial, but it also works because Entra ID permits users to have an unverified email address, opening the door to user impersonation across tenant boundaries.

It also exploits the fact that an app using multiple identity providers (e.g., Google, Facebook, or Microsoft) could inadvertently allow an attacker to sign in to a target user’s account simply because the email address is used as the sole criteria to uniquely identify users and merge accounts.

Semperis’ threat model focuses on a variant of nOAuth, specifically finding applications that allow for Entra ID cross-tenant access. In other words, both the attacker and the victim are on two different Entra ID tenants.

“nOAuth abuse is a serious threat that many organizations may be exposed to,” Eric Woodruff, chief identity architect at Semperis, said. “It’s low effort, leaves almost no trace and bypasses end‑user protections.”

“An attacker that successfully abuses nOAuth would be able not only to gain access to the SaaS application data, but also potentially to pivot into Microsoft 365 resources.”

Semperis said it reported the findings to Microsoft in December 2024, prompting the Windows maker to reiterate recommendations it gave back in 2023, coinciding with the public disclosure of nOAuth. It also noted that vendors that do not comply with the guidelines risk getting their apps removed from the Entra App Gallery.

Microsoft has also emphasized that the use of claims other than subject identifier (referred to as the “sub” claim) to uniquely identify an end user in OpenID Connect is non-compliant.

“If an OpenID Connect relying party uses any other claims in a token besides a combination of the sub (subject) claim and the iss (issuer) claim as a primary account identifier in OpenID Connect, they’re breaking the contract of expectations between federated identity provider and relying party,” the company noted at that time.

Mitigating nOAuth ultimately rests in the hands of developers, who must properly implement authentication to prevent account takeovers by creating a unique, immutable user identifier.

“nOAuth abuse exploits cross-tenant vulnerabilities and can lead to SaaS application data exfiltration, persistence, and lateral movement,” the company said. “The abuse is difficult for customers of vulnerable applications to detect and impossible for customers of vulnerable applications to defend against.”

Cybersecurity

The disclosure comes as Trend Micro revealed that misconfigured or overly privileged containers in Kubernetes environments can be used to facilitate access to sensitive Amazon Web Services (AWS) credentials, enabling attackers to conduct follow-on activities.

The cybersecurity company said attackers can exploit excessive privileges granted to containers using methods like packet sniffing of unencrypted HTTP traffic to access plaintext credentials and API spoofing, which uses manipulated Network Interface Card (NIC) settings to intercept Authorization tokens and gain elevated privileges.

“The findings […] highlight critical security considerations when using Amazon EKS Pod Identity for simplifying AWS resource access in Kubernetes environments,” security researcher Jiri Gogela said.

“These vulnerabilities underscore the importance of adhering to the principle of least privilege, ensuring container configurations are scoped appropriately, and minimizing opportunities for exploitation by malicious actors.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Swisscom claims world first with sovereign SASE connectivity service | Computer Weekly
Next Article ‘Scary’ Android change sparks fears as Google warns AI will ‘control’ WhatsApp
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

The EarFun Air Pro 4 earbuds are on sale for just $63 ahead of Prime Day
News
Indonesian government wary of Temu’s entry, citing threats to local sellers · TechNode
Computing
Netflix renews new psychological thriller from Warrior Nun creator
News
GSR Launches Enhanced Systematic OTC Platform, Expanding FX Capabilities And Asset Coverage | HackerNoon
Computing

You Might also Like

Computing

Indonesian government wary of Temu’s entry, citing threats to local sellers · TechNode

1 Min Read
Computing

GSR Launches Enhanced Systematic OTC Platform, Expanding FX Capabilities And Asset Coverage | HackerNoon

3 Min Read
Computing

Xiaomi builds GPU cluster, intensifies investment in AI models · TechNode

2 Min Read
Computing

Magic Newton Foundation Redefines Fair Token Launches With $NEWT | HackerNoon

6 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?