Threat Advisories:
Critical Threat Research : Middle-East at WAR: The Rapidly Escalating Iranian Cyber Threat Download the Report

CVE-2025-55241: Critical Cross-Tenant Privilege Escalation in Microsoft Entra ID

Red | Vulnerability Report
Download PDF

CVE-2025-55241: Critical Cross-Tenant Privilege Escalation Vulnerability in Microsoft Entra ID

Summary

CVE-2025-55241 represents a critical privilege escalation vulnerability in Microsoft Entra ID (formerly Azure Active Directory) discovered on July 14, 2025, allowing attackers to escalate privileges and impersonate any user across Entra ID tenants, including Global Administrators. This Entra ID vulnerability exploited flaws in undocumented Microsoft-internal “Actor tokens” combined with validation weaknesses in the legacy Azure AD Graph API. The Entra ID security flaw bypassed multi-factor authentication and Conditional Access policies while leaving minimal audit logs, making detection of Entra ID compromise extremely difficult. This Entra ID vulnerability carried a maximum CVSS score of 10.0, representing the highest possible severity for cloud identity systems. Microsoft rapidly deployed a global Entra ID fix after the July 2025 vulnerability report, with no evidence of active exploitation discovered. Organizations must verify Entra ID patching, immediately retire deprecated Azure AD Graph APIs, migrate to Microsoft Graph, and conduct comprehensive reviews of Entra ID audit logs for suspicious activity during the July-August 2025 affected period. This critical Entra ID flaw highlighted significant risks in cloud identity trust boundaries and emphasized the necessity for strict token validation across all Entra ID implementations.

Vulnerability Details

Entra ID CVE-2025-55241 Actor Token Exploitation

CVE-2025-55241 is a critical privilege-escalation vulnerability in Microsoft Entra ID, carrying a maximum CVSS score of 10.0 and discovered by security researcher Dirk-Jan Mollema in July 2025. This Entra ID vulnerability resulted from the combination of undocumented Microsoft-internal “Actor tokens” and a validation flaw in the legacy Azure AD Graph API. These Entra ID security issues allowed attackers controlling one Entra ID tenant to craft tokens that were improperly accepted by other Entra ID tenants, enabling cross-tenant impersonation of users, including Global Administrators with full Entra ID privileges.

Entra ID Cross-Tenant Attack Chain Mechanics

The Entra ID attack chain was unusually simple considering its critical severity. An attacker with access to any Entra ID tenant could obtain an Actor token intended for internal Microsoft service operations within Entra ID infrastructure. When paired with the Azure AD Graph API’s weak tenant-validation logic, this token enabled creation of forged identities that authenticated as arbitrary users in other Entra ID organizations. Actor-token authentication also bypassed multi-factor authentication and Conditional Access policies in Entra ID, and because related Graph API calls produced limited logs, initial reconnaissance and Entra ID exploitation were extremely difficult to detect through standard security monitoring.

Entra ID Global Administrator Impersonation Impact

Successful impersonation of a Global Administrator through this Entra ID vulnerability could expose or alter sensitive directory data, identity configurations, and application permissions within Entra ID environments, while granting unauthorized access to connected Microsoft 365 and Azure resources. The combination of exploitation ease, stealth characteristics, and potential impact led security researchers to warn that nearly all Entra ID tenants were theoretically vulnerable to this cross-tenant privilege escalation attack. This Entra ID security flaw represented one of the most severe cloud identity vulnerabilities disclosed in 2025.

Microsoft Entra ID Emergency Response and Patching

Microsoft issued a global Entra ID hotfix within three days of the July 14, 2025 vulnerability report and deployed additional mitigations to Entra ID infrastructure by early August 2025. Microsoft reported no evidence of in-the-wild exploitation of this Entra ID vulnerability, though Actor-token usage was not comprehensively logged in Entra ID systems; Microsoft instead relied on broader service telemetry and administrative-activity patterns to identify potential signs of abuse. Because the Entra ID fix was automatically applied globally, the September 4, 2025 security advisory required no customer action for Entra ID protection. However, organizations are strongly urged to retire the deprecated Azure AD Graph API, adopt Microsoft Graph for all Entra ID operations, and review administrative logs for suspicious Entra ID activity during the July to August 2025 vulnerability period.

Recommendations

Verify Entra ID Automatic Patch Deployment

Organizations must confirm their Entra ID tenant received Microsoft’s automatic fix deployed globally by mid-July 2025. While no customer action was required for the Entra ID patch, administrators should validate their tenant’s patch status through the Microsoft 365 admin center or Azure portal to ensure Entra ID protection is properly in place and the vulnerability has been remediated across all Entra ID infrastructure.

Migrate from Legacy Azure AD Graph API to Microsoft Graph

Immediately audit and eliminate all remaining dependencies on the legacy Azure AD Graph API (graph.windows.net) in favor of Microsoft Graph for all Entra ID operations. The legacy API was the vulnerable component enabling this Entra ID attack, and Microsoft has accelerated its decommissioning. Organizations must review all custom applications, scripts, and integrations to identify and update any code still using the deprecated endpoint that could expose Entra ID environments to similar vulnerabilities.

Conduct Entra ID Forensic Audit Log Review

Search Entra ID audit logs for July-August 2025 using provided KQL detection queries to identify potential abuse indicators within Entra ID systems. Specifically look for operations where the display name shows Microsoft services such as Exchange, SharePoint, or Skype, but the user principal name indicates a regular user account rather than legitimate service principals, which could indicate Entra ID Actor token exploitation attempts.

Review and Harden Entra ID Privileged Access

Conduct comprehensive audits of all privileged role assignments within Entra ID, especially Global Administrator accounts, and review service principal permissions and credentials. Examine any new user accounts, credential additions to existing applications, or permission grants created in Entra ID between July to August 2025, as these were common post-exploitation techniques that would have generated audit logs. Implement least-privilege access principles for Entra ID and enable Privileged Identity Management (PIM) for just-in-time administrative access to Entra ID resources.

Assess Entra ID Business-to-Business Trust Relationships

Review your Entra ID tenant’s guest user configurations and B2B trust relationships, as the vulnerability could be exploited by threat actors hopping across organizational boundaries through Entra ID guest accounts. Evaluate default guest user permissions in Entra ID, restrict external collaboration where not business-critical, and implement stricter controls on which external users can enumerate your Entra ID directory to prevent cross-tenant exploitation vectors.

MITRE ATT&CK TTPs

Persistence (TA0003)
  • T1078: Valid Accounts – Exploitation of legitimate Entra ID accounts
  • T1078.004: Cloud Accounts – Compromise of cloud-based Entra ID accounts
Defense Evasion (TA0005)
  • T1562: Impair Defenses – Bypassing Entra ID security controls
  • T1562.008: Disable Cloud Logs – Minimal logging of Entra ID exploitation
Initial Access (TA0001)
  • Cross-tenant access through Entra ID vulnerability exploitation
Impact (TA0040)
  • Unauthorized access to sensitive Entra ID resources and data
Discovery (TA0007)
  • T1087: Account Discovery – Entra ID account enumeration
  • T1087.004: Cloud Account – Cloud account discovery in Entra ID
Privilege Escalation (TA0004)
  • T1068: Exploitation for Privilege Escalation – Entra ID privilege escalation through CVE
  • T1134.001: Token Impersonation/Theft – Actor token theft and impersonation in Entra ID
Credential Access (TA0006)
  • T1098: Account Manipulation – Entra ID account modification
  • T1098.001: Additional Cloud Credentials – Adding credentials to Entra ID accounts
Resource Development
  • T1588: Obtain Capabilities – Acquiring Entra ID exploit capabilities
  • T1588.005: Exploits – Development of Entra ID vulnerability exploits
  • T1588.006: Vulnerabilities – Leveraging Entra ID vulnerability information
Access Token Manipulation
  • T1134: Access Token Manipulation – Manipulation of Entra ID access tokens
  • T1199: Trusted Relationship – Abuse of Entra ID trust relationships
  • T1621: Multi-Factor Authentication Request Generation – Bypassing MFA in Entra ID

References

  • Microsoft Security Response Center: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-55241
  • Dirk-Jan Mollema Technical Analysis: https://dirkjanm.io/obtaining-global-admin-in-every-entra-id-tenant-with-actor-tokens/
  • CyberMaxx Security Advisory: https://www.cybermaxx.com/resources/critical-entra-id-vulnerability-cve-2025-55241-microsoft-issues-emergency-fix-for-cross-tenant-token-exploit/

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox