One Token to rule them all - obtaining Global Admin in every Entra ID tenant via Actor tokens

While preparing for my Black Hat and DEF CON talks in July of this year, I found the most impactful Entra ID vulnerability that I will probably ever find. One that could have allowed me to compromise every Entra ID tenant in the world (except probably those in national cloud deployments). If you are an Entra ID admin reading this, yes that means complete access to your tenant. The vulnerability consisted of two components: undocumented impersonation tokens that Microsoft uses in their backend for service-to-service (S2S) communication, called “Actor tokens”, and a critical vulnerability in the (legacy) Azure AD Graph API that did not properly validate the originating tenant, allowing these tokens to be used for cross-tenant access.

dirkjanm.io

@SwiftOnSecurity

As a #GlobalAdmin at my work, I get #notifications when my people do certain things...

- impossible travel
- click a suspicious link
- send suspicious email

I will testify that it is extremely difficult for members of our organization to notify sweepstakes winners without generating a notification and having the sending email blocked. The first and second year we ran it, I was flagged multiple times.

I should not have been able to unblock myself.