Security researchers discovered a significant design flaw in a Microsoft Entra ID role that could be abused for privilege escalation, potentially leading to a full tenant takeover. The vulnerability resided in the "Agent ID Administrator" role, which was intended to manage identities for AI agents but had overly broad permissions. An attacker with this role could grant themselves ownership of any service principal in the directory, including highly privileged ones. This would allow them to inject their own credentials and impersonate the service principal, inheriting its permissions. The flaw was responsibly disclosed by Silverfort, and Microsoft completed patching the issue across all cloud environments in April 2026.
The vulnerability was not a bug in the traditional sense but a critical design flaw in the permission scoping of a new administrative role. The "Agent ID Administrator" role, part of Microsoft's Agent Identity Platform, was designed for a narrow purpose: managing the lifecycle of AI agent identities. However, its permissions were not properly constrained.
Researchers found that a user assigned this role could use their permissions to modify the ownership of any service principal within the Entra ID tenant, not just the AI agent-related ones. In Entra ID, becoming an "owner" of a service principal is a takeover primitive. An owner can add new credentials (passwords or certificates) to the service principal. This allowed for a clear privilege escalation path:
RoleManagement.ReadWrite.All).If the targeted service principal had sufficient privileges, this could be chained to achieve full Global Administrator access over the entire tenant.
All Microsoft Entra ID tenants that used or could have assigned the "Agent ID Administrator" role were potentially affected. The vulnerability was in the Entra ID platform itself, not in customer-side software. Microsoft has since rolled out a fix that restricts the role's permissions to their intended scope.
There is no evidence that this vulnerability was exploited in the wild. It was discovered by security researchers at Silverfort on February 24, 2026, and responsibly disclosed to the Microsoft Security Response Center (MSRC) on March 1, 2026. Microsoft completed the rollout of a patch by April 9, 2026.
The potential impact of this flaw was critical. A low-privileged administrator, if assigned this specific role, could have escalated their privileges to take over critical applications and, in a worst-case scenario, the entire cloud environment. This undermines the principle of least privilege and the security boundaries that organizations rely on in their identity management systems. The incident serves as a reminder that even well-intentioned new features can introduce unforeseen security risks if not carefully designed and scoped.
Since the flaw is patched, hunting should focus on historical activity to ensure it was not abused prior to the fix.
Add owner to service principal event) for any instances where a user with the "Agent ID Administrator" role was added as an owner to a service principal that was not an AI agent. This can be achieved using D3-DAM: Domain Account Monitoring.Proactive detection for this type of flaw involves continuous monitoring of identity and access management configurations.
Microsoft has already remediated the vulnerability on their end by restricting the permissions of the "Agent ID Administrator" role. No action is required from customers to receive the patch.
However, organizations should take the following steps as a matter of good security hygiene:
Regularly audit administrative role assignments and use Just-In-Time (JIT) access with tools like Entra ID PIM to enforce the principle of least privilege.
Continuously monitor and audit identity provider logs for high-risk activities such as ownership changes and credential additions to critical principals.
Implement strong governance around the creation and modification of roles and permissions within the identity provider.
Silverfort researchers discover the vulnerability.
The vulnerability is responsibly disclosed to the Microsoft Security Response Center (MSRC).
Microsoft completes the rollout of the patch across all cloud environments.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.