• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
microsoft patches entra id role flaw that enabled service principal

Microsoft Patches Entra ID Role Flaw That Enabled Service Principal Takeover

You are here: Home / General Cyber Security News / Microsoft Patches Entra ID Role Flaw That Enabled Service Principal Takeover
April 28, 2026

An administrative role meant for artificial intelligence (AI) agents within Microsoft Entra ID could enable privilege escalation and identity takeover attacks, according to new findings from Silverfort.

Agent ID Administrator is a privileged built-in role introduced by Microsoft as part of its agent identity platform to handle all aspects of an AI agent’s identity lifecycle operations in a tenant. The platform enables AI agents to authenticate securely and access necessary resources, as well as discover other agents.

However, the shortcoming discovered by the identity security platform meant that users assigned the Agent ID Administrator role could take over arbitrary service principals, including those beyond agent-related identities, by becoming an owner and then add their own credentials to authenticate as that principal.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

“That’s full service principal takeover,” security researcher Noa Ariel said. “In tenants where high-privileged service principals exist, it becomes a privilege escalation path.”

This ownership of a service principal effectively opens the door to an attacker to operate within the scope of its existing permissions. If the targeted service principal holds elevated permissions – particularly privileged directory roles and high-impact Graph app permissions – it can give an attacker broader control over the tenant.

Following responsible disclosure on March 1, 2026, Microsoft rolled out a patch across all cloud environments to remediate the scope overreach on April 9. Following the fix, any attempt to assign ownership over non-agent service principals using the Agent ID Administrator role is now blocked, and leads to a “Forbidden” error message being displayed.

Silverfort noted that the architectural issue highlights the need for validating how roles are scoped and permissions are applied, especially when it comes to shared identity components and new identity types are built on top of the foundations of existing primitives.

Cybersecurity

To mitigate the threat posed by this risk, organizations are advised to monitor sensitive role usage, particularly those related to service principal ownership or credential changes, track service principal ownership changes, secure privileged service principals, and audit credential creation on service principals.

“Agent identities are part of the broader shift toward non-human identities, built for the age of AI agents,” Ariel noted. “When role permissions are applied on top of shared foundations without strict scoping, access can extend beyond what was originally intended. In this case, that gap led to broader access, especially when privileged service principals were involved.”

“Additionally, the overall risk is influenced by tenant posture, particularly around privileged service principals, where ownership abuse remains a well-known and impactful attack path.”

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «microsoft confirms active exploitation of windows shell cve 2026 32202 Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Microsoft Patches Entra ID Role Flaw That Enabled Service Principal Takeover
  • Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202
  • Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack
  • ⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More
  • Mythos Changed the Math on Vulnerability Discovery. Most Teams Aren’t Ready for the Remediation Side
  • PhantomCore Exploits TrueConf Vulnerabilities to Breach Russian Networks
  • Researchers Uncover 73 Fake VS Code Extensions Delivering GlassWorm v2 Malware
  • Fake CAPTCHA IRSF Scam and 120 Keitaro Campaigns Drive Global SMS, Crypto Fraud
  • Researchers Uncover Pre-Stuxnet ‘fast16’ Malware Targeting Engineering Software
  • CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline

Copyright © TheCyberSecurity.News, All Rights Reserved.