Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

WhatsApp adds resumes that run on AI, for faster preview chat

June 26, 2025

Noauth vulnerability by -still affects 9% Microsoft Entra Saas applications two years after opening

June 25, 2025

Citrix releases emergency patches for actively exploited CVE-2025-6543 in ADC NetsCale

June 25, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Noauth vulnerability by -still affects 9% Microsoft Entra Saas applications two years after opening
Global Security

Noauth vulnerability by -still affects 9% Microsoft Entra Saas applications two years after opening

AdminBy AdminJune 25, 2025No Comments4 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


June 25, 2025Red LakshmananSecurity / vulnerability Saas

New Studies have found a constant risk on the well -known security weakness in Microsoft’s Entra ID.

SEMPERIS Identity Safety Company in analysis Out of 104 SAAS apps have found nine of them vulnerable to abuse the cross -tenor Entra.

For the first time disclosed by a decope in June 2023, Know refers to weakness in how Saas apps implement Openid Connect (Curriculum), which denotes the authentication layer built on the top of Oauth to verify the user’s identity.

The lack of authentication implementation, essentially, allows the bad actors to change the mail attribute in the Entra account on the sacrifice account and use the “Microsoft” feature to steal this account.

Cybersecurity

The attack trivial but it also works because Entra ID allows users to have an unauthorized email address, opening the door for users through the tenant.

It also uses the fact that the application using multiple personality certificate providers (such as Google, Facebook or Microsoft) can unintended the attacker log in the target user simply because the email address is used as the only criteria for a clear identification identification and combining accounts.

The Semperis threatening model is focused on the NOAUTH variant, in particular application search that allows you to access the Entra ID. In other words, both the attacker and the victim are on two different ID Entra tenants.

“Noauth abuse is a serious threat that many organizations can be subjected to,” said Eric Woodruf, the chief architect of the identity in Semperis. “It’s low effort, leaves virtually no trace and bypassing the final users.”

“The attacker who successfully abuses Noauth will be able not only access to SAAS app data, but also potentially to translate Microsoft 365 resources.”

Semperis said it reports on the results of Microsoft in December 2024, which forced the manufacturer Windows to confirm once again the recommendations he gave in 2023, coinciding with the public disclosure of Noat. He also noted that providers who do not meet the recommendations risk removing their applications from the Entra app gallery.

Microsoft also has stressed What use claims other than the subject ID (called “Requirement”) to clearly identify the final user in Openid Connect does not meet the requirements.

“If an Openid Connect participant relies on any other claims in except the combination of subjects (subjects), and ISS (issuer) as the main account ID in Openid Connect, they violate the expectation contract between the identity provider and rely on the party,” the company said at the time.

The Noauth memory eventually lies in the hands of the developers who must properly implement authentication to prevent the absorption of accounts by creating a unique, unchanged user identifier.

“The abuse of NOAUT exploits the vulnerabilities of the crosses and can lead to SAAS data, perseverance and lateral motion,” the company said. “Abuse for customers vulnerable applications is difficult to detect and it is impossible for clients vulnerable applications against which.”

Cybersecurity

Disclosure occurs when Trend Micro showed that to facilitate access to access access access to access access to access to Amazon Web Services (AWS), which allows the attackers to conduct the following activities.

Cybersecurity company said attackers can use excessive privileges provided by containers using methods such as a sniffing package of unexpressed HTTP traffic to access accounts and reinforcement of API, which uses the settings of the manipulated network interface (NIC).

“Conclusions (…) emphasize the critical security considerations when using POD Amazon Eks identity to simplify AWS resources in Kubernetes,” security researcher Jiri Hogel – Note.

“These vulnerabilities emphasize the importance of adherence to the principle of the slightest privilege, providing the correct configuration of containers and minimizing opportunities for the operation of malicious subjects.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

WhatsApp adds resumes that run on AI, for faster preview chat

June 26, 2025

Citrix releases emergency patches for actively exploited CVE-2025-6543 in ADC NetsCale

June 25, 2025

Citrix bleeding 2 defects provides tokens theft; Disadvantages SAP GUI Risk sensitive to data, impact of data

June 25, 2025

Praisian Khactivist Group traces Personal Records from Saudi Games 2024

June 25, 2025

Sonicwall Netextender Trojan and Connectwise Explois

June 25, 2025

North Korea related to supply networks is focused on developers with 35 malicious NPM packages

June 25, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

WhatsApp adds resumes that run on AI, for faster preview chat

June 26, 2025

Noauth vulnerability by -still affects 9% Microsoft Entra Saas applications two years after opening

June 25, 2025

Citrix releases emergency patches for actively exploited CVE-2025-6543 in ADC NetsCale

June 25, 2025

Citrix bleeding 2 defects provides tokens theft; Disadvantages SAP GUI Risk sensitive to data, impact of data

June 25, 2025

Praisian Khactivist Group traces Personal Records from Saudi Games 2024

June 25, 2025

Sonicwall Netextender Trojan and Connectwise Explois

June 25, 2025

North Korea related to supply networks is focused on developers with 35 malicious NPM packages

June 25, 2025

Microsoft extends Windows 10 security updates on one year with new enrollment options

June 25, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

WhatsApp adds resumes that run on AI, for faster preview chat

June 26, 2025

Noauth vulnerability by -still affects 9% Microsoft Entra Saas applications two years after opening

June 25, 2025

Citrix releases emergency patches for actively exploited CVE-2025-6543 in ADC NetsCale

June 25, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.