Skip to main content

CVE-2024-43477: CWE-284: Improper Access Control in Microsoft Microsoft Entra

High
VulnerabilityCVE-2024-43477cvecve-2024-43477cwe-284
Published: Fri Aug 23 2024 (08/23/2024, 01:14:09 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Microsoft Entra

Description

Improper access control in Decentralized Identity Services resulted in a vulnerability that allows an unauthenticated attacker to disable Verifiable ID's on another tenant.

AI-Powered Analysis

AILast updated: 07/04/2025, 04:41:26 UTC

Technical Analysis

CVE-2024-43477 is a high-severity vulnerability identified in Microsoft Entra's Decentralized Identity Services, specifically impacting the Verifiable ID feature. The root cause is improper access control (CWE-284), which allows an unauthenticated attacker to disable Verifiable IDs on tenants other than their own. Verifiable IDs are a critical component of decentralized identity management, enabling secure and privacy-preserving authentication and authorization across services. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network with low attack complexity. Although the vulnerability does not directly compromise confidentiality or integrity of data, it results in a complete denial of availability of the Verifiable ID service for affected tenants. This can disrupt identity verification processes, potentially halting access to dependent applications and services that rely on Microsoft Entra for identity validation. The CVSS 3.1 base score is 7.5, reflecting the high impact on availability and ease of exploitation without privileges or user interaction. No known exploits in the wild have been reported yet, and no specific patches or mitigations have been linked at the time of publication. Given the critical role of decentralized identity in modern enterprise and cloud environments, this vulnerability poses a significant risk to organizations relying on Microsoft Entra for identity services.

Potential Impact

For European organizations, the impact of this vulnerability could be substantial, especially for those leveraging Microsoft Entra for decentralized identity and Verifiable ID implementations. Disabling Verifiable IDs can lead to denial of service conditions for identity verification workflows, affecting employee access, customer authentication, and inter-organizational trust frameworks. This disruption could delay business operations, reduce productivity, and undermine compliance with identity-related regulations such as eIDAS and GDPR, which emphasize secure and reliable identity management. Additionally, organizations in sectors with high identity assurance requirements—such as finance, healthcare, and government—may face increased operational risk and potential regulatory scrutiny if identity services are interrupted. The fact that exploitation requires no authentication or user interaction increases the urgency for European organizations to assess their exposure and implement mitigations promptly.

Mitigation Recommendations

1. Monitor official Microsoft security advisories closely for patches or updates addressing CVE-2024-43477 and apply them immediately upon release. 2. Implement network-level controls to restrict access to Microsoft Entra management endpoints, limiting exposure to trusted IP ranges and internal networks where feasible. 3. Employ anomaly detection and logging to identify unusual attempts to disable Verifiable IDs or other suspicious activities related to decentralized identity services. 4. Review and tighten tenant-level access policies and configurations within Microsoft Entra to minimize the attack surface. 5. Engage with Microsoft support or security teams to obtain guidance on interim protective measures until a patch is available. 6. Educate security and IT teams about the vulnerability’s nature and ensure incident response plans include scenarios involving identity service disruptions. 7. Consider multi-factor authentication and additional identity verification layers outside of Verifiable IDs to maintain operational continuity in case of service disruption.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-08-14T01:08:33.517Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb2d9

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/4/2025, 4:41:26 AM

Last updated: 8/15/2025, 5:50:28 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats