Microsoft Patches Entra ID Role Flaw That Enabled Service Principal Takeover

Source: The Hacker News

Author: info@thehackernews.com (The Hacker News)

URL: https://thehackernews.com/2026/04/microsoft-patches-entra-id-role-flaw.html

ONE SENTENCE SUMMARY:

Silverfort found Entra’s Agent ID Administrator role allowed service principal takeovers, enabling privilege escalation until Microsoft patched scope checks globally.

MAIN POINTS:

  1. Microsoft introduced Agent ID Administrator to manage AI agent identities’ full lifecycle.
  2. The agent identity platform supports secure authentication, resource access, and agent discovery.
  3. Silverfort discovered role holders could assign themselves ownership of arbitrary service principals.
  4. Ownership enabled attackers to add credentials and authenticate as the hijacked principal.
  5. Compromised principals let adversaries act within whatever permissions the principal already had.
  6. Privileged service principals could grant directory roles or high-impact Microsoft Graph permissions.
  7. Researcher Noa Ariel described the issue as “full service principal takeover.”
  8. Responsible disclosure occurred March 1, 2026, with remediation deployed April 9 across clouds.
  9. Post-fix attempts to target non-agent service principals now fail with a “Forbidden” error.
  10. The case underscores scoping validation risks when building new identities atop shared primitives.

TAKEAWAYS:

  1. Treat service principal ownership as a high-risk capability requiring tight governance.
  2. Confirm built-in role scopes match intended identity types, especially for emerging agent identities.
  3. Track and investigate changes to service principal owners as potential takeover indicators.
  4. Audit service principal credential creation and modifications to detect unauthorized persistence.
  5. Strengthen tenant posture by hardening and reviewing all privileged service principals regularly.