Design Flaw in Microsoft Entra ID's "Agent ID Administrator" Role Enabled Privilege Escalation and Tenant Takeover

Microsoft Patches Entra ID Flaw That Allowed Service Principal Takeover

HIGH
May 2, 2026
5m read
VulnerabilityCloud SecurityPatch Management

Related Entities

Organizations

Microsoft SilverfortMicrosoft Security Response Center (MSRC)

Products & Tech

Microsoft Entra ID

Full Report

Executive Summary

Security researchers discovered a significant design flaw in a Microsoft Entra ID role that could be abused for privilege escalation, potentially leading to a full tenant takeover. The vulnerability resided in the "Agent ID Administrator" role, which was intended to manage identities for AI agents but had overly broad permissions. An attacker with this role could grant themselves ownership of any service principal in the directory, including highly privileged ones. This would allow them to inject their own credentials and impersonate the service principal, inheriting its permissions. The flaw was responsibly disclosed by Silverfort, and Microsoft completed patching the issue across all cloud environments in April 2026.


Vulnerability Details

The vulnerability was not a bug in the traditional sense but a critical design flaw in the permission scoping of a new administrative role. The "Agent ID Administrator" role, part of Microsoft's Agent Identity Platform, was designed for a narrow purpose: managing the lifecycle of AI agent identities. However, its permissions were not properly constrained.

Researchers found that a user assigned this role could use their permissions to modify the ownership of any service principal within the Entra ID tenant, not just the AI agent-related ones. In Entra ID, becoming an "owner" of a service principal is a takeover primitive. An owner can add new credentials (passwords or certificates) to the service principal. This allowed for a clear privilege escalation path:

  1. An attacker gains or is assigned the "Agent ID Administrator" role.
  2. The attacker targets a high-privilege service principal (e.g., one with roles like RoleManagement.ReadWrite.All).
  3. The attacker uses their role's permissions to add their own user account as an owner of the target service principal.
  4. Now as an owner, the attacker adds a new credential to the service principal.
  5. The attacker uses this new credential to authenticate as the service principal, inheriting all its powerful permissions.

If the targeted service principal had sufficient privileges, this could be chained to achieve full Global Administrator access over the entire tenant.

Affected Systems

All Microsoft Entra ID tenants that used or could have assigned the "Agent ID Administrator" role were potentially affected. The vulnerability was in the Entra ID platform itself, not in customer-side software. Microsoft has since rolled out a fix that restricts the role's permissions to their intended scope.

Exploitation Status

There is no evidence that this vulnerability was exploited in the wild. It was discovered by security researchers at Silverfort on February 24, 2026, and responsibly disclosed to the Microsoft Security Response Center (MSRC) on March 1, 2026. Microsoft completed the rollout of a patch by April 9, 2026.

Impact Assessment

The potential impact of this flaw was critical. A low-privileged administrator, if assigned this specific role, could have escalated their privileges to take over critical applications and, in a worst-case scenario, the entire cloud environment. This undermines the principle of least privilege and the security boundaries that organizations rely on in their identity management systems. The incident serves as a reminder that even well-intentioned new features can introduce unforeseen security risks if not carefully designed and scoped.

Cyber Observables — Hunting Hints

Since the flaw is patched, hunting should focus on historical activity to ensure it was not abused prior to the fix.

  • Audit Log Analysis: Security teams should review Entra ID audit logs (specifically the Add owner to service principal event) for any instances where a user with the "Agent ID Administrator" role was added as an owner to a service principal that was not an AI agent. This can be achieved using D3-DAM: Domain Account Monitoring.
  • Role Assignments: Review historical assignments of the "Agent ID Administrator" role. Investigate all activity performed by users while they held this role.
  • Service Principal Credentials: Audit for unexpected credential additions to high-privilege service principals between the role's introduction and April 9, 2026.

Detection Methods

Proactive detection for this type of flaw involves continuous monitoring of identity and access management configurations.

  • Entra ID Audit Logs: Continuously ingest and analyze Entra ID audit logs in a SIEM. Create alerts for high-risk operations, such as ownership changes or credential additions to critical service principals.
  • IAM Security Posture Management (ISPM): Use specialized tools to monitor for risky role assignments, privilege escalation paths, and misconfigurations within Entra ID.

Remediation Steps

Microsoft has already remediated the vulnerability on their end by restricting the permissions of the "Agent ID Administrator" role. No action is required from customers to receive the patch.

However, organizations should take the following steps as a matter of good security hygiene:

  1. Review Role Assignments: Regularly audit all administrative role assignments in Entra ID. Ensure that users and service principals are granted only the permissions they absolutely need (principle of least privilege). This is a form of D3-UAP: User Account Permissions.
  2. Privileged Identity Management (PIM): Use Entra ID Privileged Identity Management (PIM) to provide just-in-time (JIT) access for administrative roles, reducing the window of opportunity for abuse.
  3. Monitor High-Privilege Principals: Implement enhanced monitoring and alerting for any changes to high-privilege service principals and applications.

Timeline of Events

1
February 24, 2026
Silverfort researchers discover the vulnerability.
2
March 1, 2026
The vulnerability is responsibly disclosed to the Microsoft Security Response Center (MSRC).
3
April 9, 2026
Microsoft completes the rollout of the patch across all cloud environments.
4
May 2, 2026
This article was published

MITRE ATT&CK Mitigations

Regularly audit administrative role assignments and use Just-In-Time (JIT) access with tools like Entra ID PIM to enforce the principle of least privilege.

Audit

M1047enterprise

Continuously monitor and audit identity provider logs for high-risk activities such as ownership changes and credential additions to critical principals.

Implement strong governance around the creation and modification of roles and permissions within the identity provider.

Timeline of Events

1
February 24, 2026

Silverfort researchers discover the vulnerability.

2
March 1, 2026

The vulnerability is responsibly disclosed to the Microsoft Security Response Center (MSRC).

3
April 9, 2026

Microsoft completes the rollout of the patch across all cloud environments.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Microsoft Entra IDAzure ADprivilege escalationservice principalidentity managementcloud securityMicrosoft

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.