PT-2025-36098 · Microsoft · Azure Entra
Dirk-Jan Mollema
+1
·
Published
2025-09-04
·
Updated
2025-11-20
·
CVE-2025-55241
CVSS v3.1
10
10
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Microsoft Entra ID (formerly Azure Active Directory) (affected versions not specified)
Description
A critical vulnerability (CVE-2025-55241) exists in Microsoft Entra ID, allowing attackers to impersonate any user, including Global Administrators, across any tenant. This is due to a flaw in the Azure AD Graph API that improperly validates originating tenants when using undocumented “Actor tokens” intended for internal service-to-service communication. These tokens, lacking security policies like Conditional Access, allowed attackers to gain complete access to a tenant with minimal logging, making detection difficult. The vulnerability could potentially compromise every Entra ID tenant globally. The issue was discovered by Dirk-jan Mollema and has been patched by Microsoft. The vulnerability has a CVSS score of 10.0, indicating maximum severity. There have been no reported exploits of this vulnerability in the wild.
Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Exploit
LPE
Improper Authentication
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-11135
CVE-2025-55241
Affected Products
Azure Entra
References · 90
- 🔥 https://dirkjanm.io/obtaining-global-admin-in-every-entra-id-tenant-with-actor-tokens · Exploit
- 🔥 https://github.com/Spanky-McSpank/CVE-2025-55241-Internal-Audit · Exploit
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55241 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-55241 · Security Note
- https://bdu.fstec.ru/vul/2025-11135 · Security Note
- https://twitter.com/_RaySecurity/status/1975972298046787846 · Twitter Post
- https://twitter.com/hasamba/status/1968668004784165252 · Twitter Post
- https://twitter.com/BhuvaneswariM15/status/1970255935655551150 · Twitter Post
- https://twitter.com/NightstarPartn1/status/1970507899332952495 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1nlubrs/top_10_trending_cves_20092025 · Reddit Post
- https://twitter.com/fridaysecurity/status/1969925283688956364 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1nmo3h6/top_10_trending_cves_21092025 · Reddit Post
- https://twitter.com/ZenoPopovici/status/1973013034290569507 · Twitter Post
- https://twitter.com/PurpleOps_io/status/1970020695011643812 · Twitter Post
- https://t.me/cKure/16331 · Telegram Post