{"id":2344,"date":"2025-06-25T16:30:00","date_gmt":"2025-06-25T13:30:00","guid":{"rendered":"https:\/\/trustcrypt.com\/microsoft-vulnerability-continues-to-expose-saas-applications-two-years-post-discovery\/"},"modified":"2025-06-25T16:30:00","modified_gmt":"2025-06-25T13:30:00","slug":"microsoft-vulnerability-continues-to-expose-saas-applications-two-years-post-discovery","status":"publish","type":"post","link":"https:\/\/trustcrypt.com\/ar\/microsoft-vulnerability-continues-to-expose-saas-applications-two-years-post-discovery\/","title":{"rendered":"Microsoft Vulnerability Continues to Expose SaaS Applications Two Years Post-Discovery"},"content":{"rendered":"<p>A critical vulnerability in Microsoft\u2019s Entra ID continues to expose numerous enterprise applications, two years post-discovery. Semperis, an identity security provider, presented new findings regarding this threat at the TROOPERS25 conference held in Heidelberg, Germany on June 25, 2025.<\/p>\n<p>The analysis revealed that approximately 15,000 software-as-a-service (SaaS) applications may be vulnerable to the nOAuth flaw, a serious authentication issue that could lead to account takeovers and data exfiltration.<\/p>\n<h3 id=\"the-noauth-vulnerability-explained\">The nOAuth Vulnerability Explained<\/h3>\n<p>Identified in June 2023, nOAuth is an authentication implementation flaw affecting Microsoft Azure AD multi-tenant Open Authorization (OAuth) applications. This flaw was uncovered by Descope through cross-tenant testing. OAuth is an open, token-based authorization framework that allows users to grant application access to their private resources without relinquishing their identity details.<\/p>\n<p>OpenID Connect (OIDC), built atop OAuth 2.0, enables applications to authenticate users and access basic profile details using JSON Web Tokens (JWT) for secure communication. The vulnerability emerges from Entra ID app configurations that accept unverified email claims as user identifiers\u2014an established anti-pattern according to OIDC standards. In such cases, an attacker only requires an Entra tenant and the target email address to seize control of the victim&#8217;s SaaS account.<\/p>\n<p>Moreover, conventional security measures, such as multifactor authentication (MFA), conditional access, and Zero Trust policies, are ineffective against this vulnerability.<\/p>\n<h3 id=\"undetected-by-saas-vendors\">Undetected by SaaS Vendors<\/h3>\n<p>Semperis&#8217;s findings suggest that despite the discovery of nOAuth two years ago, many SaaS applications remain susceptible to this flaw. Approximately 10% of the total SaaS applications in circulation\u2014estimated at over 150,000\u2014could be impacted, equating to at least 15,000 enterprise SaaS applications at risk as of June 2025.<\/p>\n<p>The ongoing oversight by SaaS vendors appears to stem from a lack of understanding of the vulnerability and the difficulty enterprises face in defending against it, thereby enabling attackers to compromise accounts and extract sensitive data.<\/p>\n<p>Eric Woodruff, the Chief Identity Architect at Semperis, categorized this vulnerability as &#8220;severe&#8221; due to its low complexity and the challenge of defending against attacks. He emphasized that developers can inadvertently adopt insecure patterns without awareness and often lack the tools to identify such weaknesses. Consequently, customers are left without effective detection or prevention strategies, making the threat particularly insidious and enduring.<\/p>\n<h3 id=\"protecting-against-noauth-vulnerabilities\">Protecting Against nOAuth Vulnerabilities<\/h3>\n<p>While traditional vulnerability mitigation techniques do not address nOAuth, Semperis recommends several strategies to lessen the risks associated with this flaw:<\/p>\n<ul>\n<li>SaaS vendors should adhere to Microsoft&#8217;s guidelines to thwart nOAuth exploitation.<\/li>\n<li>Developers must implement essential fixes to safeguard their customer base.<\/li>\n<li>Organizations should integrate comprehensive log correlation across both Entra ID and the SaaS platform to detect nOAuth abuses.<\/li>\n<\/ul>\n<p>These steps are critical in mitigating the potential damage from this ongoing vulnerability and enhancing the overall security posture of enterprise applications.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A critical vulnerability in Microsoft\u2019s Entra ID continues to expose numerous enterprise applications, two years post-discovery. Semperis, an identity security&#8230;<\/p>\n","protected":false},"author":1,"featured_media":2345,"comment_status":"open","ping_status":"closed","sticky":false,"template":"Default","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[28],"tags":[129,109,108],"class_list":["post-2344","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-authentication","tag-software","tag-vulnerability"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Microsoft Vulnerability Continues to Expose SaaS Applications Two Years Post-Discovery - Trustcrypt<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/trustcrypt.com\/ar\/microsoft-vulnerability-continues-to-expose-saas-applications-two-years-post-discovery\/\" \/>\n<meta property=\"og:locale\" content=\"ar_AR\" \/>\n<meta property=\"og:locale:alternate\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Vulnerability Continues to Expose SaaS Applications Two Years Post-Discovery\" \/>\n<meta property=\"og:description\" content=\"A critical vulnerability in Microsoft\u2019s Entra ID continues to expose numerous enterprise applications, two years post-discovery. Semperis, an identity security...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/trustcrypt.com\/ar\/microsoft-vulnerability-continues-to-expose-saas-applications-two-years-post-discovery\/\" \/>\n<meta property=\"og:site_name\" content=\"Trustcrypt\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-25T13:30:00+00:00\" \/>\n<meta name=\"author\" content=\"Trustscrypt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0643\u064f\u062a\u0628 \u0628\u0648\u0627\u0633\u0637\u0629\" \/>\n\t<meta name=\"twitter:data1\" content=\"Trustscrypt\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631\" \/>\n\t<meta name=\"twitter:data2\" content=\"\u062f\u0642\u064a\u0642\u062a\u0627\u0646\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/trustcrypt.com\/microsoft-vulnerability-continues-to-expose-saas-applications-two-years-post-discovery\/\",\"url\":\"https:\/\/trustcrypt.com\/microsoft-vulnerability-continues-to-expose-saas-applications-two-years-post-discovery\/\",\"name\":\"Microsoft Vulnerability Continues to Expose SaaS Applications Two Years Post-Discovery\",\"isPartOf\":{\"@id\":\"https:\/\/trustcrypt.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/trustcrypt.com\/microsoft-vulnerability-continues-to-expose-saas-applications-two-years-post-discovery\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/trustcrypt.com\/microsoft-vulnerability-continues-to-expose-saas-applications-two-years-post-discovery\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trustcrypt.com\/wp-content\/uploads\/2025\/06\/microsoft-vulnerability-continues-to-expose-saas-applications-two-years-post-discovery.webp\",\"datePublished\":\"2025-06-25T13:30:00+00:00\",\"author\":{\"@id\":\"https:\/\/trustcrypt.com\/#\/schema\/person\/469b1cf97b9f7ea4e4d7fa31689dfa9f\"},\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/trustcrypt.com\/microsoft-vulnerability-continues-to-expose-saas-applications-two-years-post-discovery\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/trustcrypt.com\/microsoft-vulnerability-continues-to-expose-saas-applications-two-years-post-discovery\/#primaryimage\",\"url\":\"https:\/\/trustcrypt.com\/wp-content\/uploads\/2025\/06\/microsoft-vulnerability-continues-to-expose-saas-applications-two-years-post-discovery.webp\",\"contentUrl\":\"https:\/\/trustcrypt.com\/wp-content\/uploads\/2025\/06\/microsoft-vulnerability-continues-to-expose-saas-applications-two-years-post-discovery.webp\",\"width\":1792,\"height\":1024,\"caption\":\"Microsoft Vulnerability Continues to Expose SaaS Applications Two Years Post-Discovery\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/trustcrypt.com\/#website\",\"url\":\"https:\/\/trustcrypt.com\/\",\"name\":\"Trustcrypt\",\"description\":\"\u0627\u0644\u0623\u0645\u0646 \u0647\u0648 \u0627\u0633\u0645\u0646\u0627 \u0627\u0644\u062b\u0627\u0646\u064a\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/trustcrypt.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ar\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/trustcrypt.com\/#\/schema\/person\/469b1cf97b9f7ea4e4d7fa31689dfa9f\",\"name\":\"Trustscrypt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/trustcrypt.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4c36ff3376565a0f4981e9397667feb08d5e09acacce32a52ea4a3f628e03692?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4c36ff3376565a0f4981e9397667feb08d5e09acacce32a52ea4a3f628e03692?s=96&d=mm&r=g\",\"caption\":\"Trustscrypt\"},\"sameAs\":[\"http:\/\/trustcrypt.com\"],\"url\":\"https:\/\/trustcrypt.com\/ar\/author\/trustscrypt\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Vulnerability Continues to Expose SaaS Applications Two Years Post-Discovery - Trustcrypt","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/trustcrypt.com\/ar\/microsoft-vulnerability-continues-to-expose-saas-applications-two-years-post-discovery\/","og_locale":"ar_AR","og_type":"article","og_title":"[:en]Microsoft Vulnerability Continues to Expose SaaS Applications Two Years Post-Discovery[:] - Trustcrypt","og_description":"A critical vulnerability in Microsoft\u2019s Entra ID continues to expose numerous enterprise applications, two years post-discovery. Semperis, an identity security...","og_url":"https:\/\/trustcrypt.com\/ar\/microsoft-vulnerability-continues-to-expose-saas-applications-two-years-post-discovery\/","og_site_name":"Trustcrypt","article_published_time":"2025-06-25T13:30:00+00:00","author":"Trustscrypt","twitter_card":"summary_large_image","twitter_misc":{"\u0643\u064f\u062a\u0628 \u0628\u0648\u0627\u0633\u0637\u0629":"Trustscrypt","\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631":"\u062f\u0642\u064a\u0642\u062a\u0627\u0646"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/trustcrypt.com\/microsoft-vulnerability-continues-to-expose-saas-applications-two-years-post-discovery\/","url":"https:\/\/trustcrypt.com\/microsoft-vulnerability-continues-to-expose-saas-applications-two-years-post-discovery\/","name":"Microsoft Vulnerability Continues to Expose SaaS Applications Two Years Post-Discovery","isPartOf":{"@id":"https:\/\/trustcrypt.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/trustcrypt.com\/microsoft-vulnerability-continues-to-expose-saas-applications-two-years-post-discovery\/#primaryimage"},"image":{"@id":"https:\/\/trustcrypt.com\/microsoft-vulnerability-continues-to-expose-saas-applications-two-years-post-discovery\/#primaryimage"},"thumbnailUrl":"https:\/\/trustcrypt.com\/wp-content\/uploads\/2025\/06\/microsoft-vulnerability-continues-to-expose-saas-applications-two-years-post-discovery.webp","datePublished":"2025-06-25T13:30:00+00:00","author":{"@id":"https:\/\/trustcrypt.com\/#\/schema\/person\/469b1cf97b9f7ea4e4d7fa31689dfa9f"},"inLanguage":"ar","potentialAction":[{"@type":"ReadAction","target":["https:\/\/trustcrypt.com\/microsoft-vulnerability-continues-to-expose-saas-applications-two-years-post-discovery\/"]}]},{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/trustcrypt.com\/microsoft-vulnerability-continues-to-expose-saas-applications-two-years-post-discovery\/#primaryimage","url":"https:\/\/trustcrypt.com\/wp-content\/uploads\/2025\/06\/microsoft-vulnerability-continues-to-expose-saas-applications-two-years-post-discovery.webp","contentUrl":"https:\/\/trustcrypt.com\/wp-content\/uploads\/2025\/06\/microsoft-vulnerability-continues-to-expose-saas-applications-two-years-post-discovery.webp","width":1792,"height":1024,"caption":"Microsoft Vulnerability Continues to Expose SaaS Applications Two Years Post-Discovery"},{"@type":"WebSite","@id":"https:\/\/trustcrypt.com\/#website","url":"https:\/\/trustcrypt.com\/","name":"Trustcrypt","description":"\u0627\u0644\u0623\u0645\u0646 \u0647\u0648 \u0627\u0633\u0645\u0646\u0627 \u0627\u0644\u062b\u0627\u0646\u064a","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/trustcrypt.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ar"},{"@type":"Person","@id":"https:\/\/trustcrypt.com\/#\/schema\/person\/469b1cf97b9f7ea4e4d7fa31689dfa9f","name":"Trustscrypt","image":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/trustcrypt.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4c36ff3376565a0f4981e9397667feb08d5e09acacce32a52ea4a3f628e03692?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4c36ff3376565a0f4981e9397667feb08d5e09acacce32a52ea4a3f628e03692?s=96&d=mm&r=g","caption":"Trustscrypt"},"sameAs":["http:\/\/trustcrypt.com"],"url":"https:\/\/trustcrypt.com\/ar\/author\/trustscrypt\/"}]}},"_links":{"self":[{"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/posts\/2344","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/comments?post=2344"}],"version-history":[{"count":0,"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/posts\/2344\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/media\/2345"}],"wp:attachment":[{"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/media?parent=2344"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/categories?post=2344"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/tags?post=2344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}