Microsoft Entra ID Security Flaw: A Comedy of Errors in SaaS Account Takeovers
Microsoft Entra ID nOAuth abuse is causing a stir, with identity security firm Semperis finding vulnerabilities in nine SaaS apps. This flaw lets attackers impersonate users across different tenants, opening the door for account takeovers. It’s a low-effort, high-reward scenario that leaves security experts shaking in their digital boots.

Hot Take:
Ah, Microsoft Entra ID, the gift that keeps on giving… to hackers. Who knew that “Log in with Microsoft” could also mean “Log in as someone else entirely”? It’s like inviting strangers to your party and giving them a VIP pass. Maybe it’s time for Microsoft to stop “Entr’ing” bad actors and start locking the doors with some proper identity checks.
Key Points:
- Semperis discovered vulnerabilities in nine out of 104 SaaS apps using Microsoft’s Entra ID.
- The flaw, known as nOAuth, allows for cross-tenant account takeovers.
- The weakness stems from unverified email addresses and reliance on email for user identification.
- Microsoft reiterated its guidelines from 2023 to mitigate these risks.
- Developers must implement robust authentication to prevent account hijacking.
Already a member? Log in here