Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26685: CWE-287: Improper Authentication in Microsoft Microsoft Defender for Identity

0
Medium
VulnerabilityCVE-2025-26685cvecve-2025-26685cwe-287
Published: Tue May 13 2025 (05/13/2025, 16:58:55 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Microsoft Defender for Identity

Description

Improper authentication in Microsoft Defender for Identity allows an unauthorized attacker to perform spoofing over an adjacent network.

AI-Powered Analysis

AILast updated: 09/10/2025, 03:12:28 UTC

Technical Analysis

CVE-2025-26685 is a vulnerability classified under CWE-287 (Improper Authentication) affecting Microsoft Defender for Identity. This security flaw allows an unauthorized attacker to perform spoofing attacks over an adjacent network. Specifically, the vulnerability arises because the authentication mechanisms in Microsoft Defender for Identity do not adequately verify the identity of communicating entities, enabling an attacker within the same network segment to impersonate legitimate devices or services. The vulnerability has a CVSS 3.1 base score of 6.5, indicating a medium severity level. The attack vector is adjacent network (AV:A), meaning the attacker must have access to the local network segment, but no privileges (PR:N) or user interaction (UI:N) are required. The impact primarily affects confidentiality (C:H), with no direct impact on integrity or availability. This suggests that an attacker could potentially intercept or spoof sensitive identity-related information without disrupting service or modifying data. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on May 13, 2025, with the reservation date in February 2025. Microsoft Defender for Identity is a security product designed to detect and investigate advanced threats, compromised identities, and insider actions within enterprise networks, often integrated with Active Directory environments. The improper authentication flaw could undermine the trustworthiness of identity signals and alerts generated by Defender for Identity, potentially allowing attackers to evade detection or manipulate identity-related telemetry.

Potential Impact

For European organizations, the impact of this vulnerability could be significant, especially for enterprises relying heavily on Microsoft Defender for Identity to secure their Active Directory environments and monitor identity-based threats. Successful exploitation could allow attackers to spoof legitimate network entities, leading to unauthorized access to sensitive identity information or evasion of security monitoring. This could facilitate further lateral movement, privilege escalation, or data exfiltration within corporate networks. Given the medium severity and the requirement for adjacent network access, the threat is more pronounced in environments with less segmented or poorly controlled internal networks. Organizations in sectors with stringent regulatory requirements for identity and access management, such as finance, healthcare, and critical infrastructure, could face compliance risks if this vulnerability is exploited. Additionally, the confidentiality breach could expose personally identifiable information (PII) or intellectual property, leading to reputational damage and potential legal consequences under GDPR.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Network Segmentation: Enforce strict segmentation of internal networks to limit the ability of attackers to gain adjacent network access to systems running Microsoft Defender for Identity. 2) Access Controls: Restrict access to Defender for Identity components to trusted hosts and users only, using network access control lists (ACLs) and firewall rules. 3) Monitoring and Anomaly Detection: Enhance monitoring for unusual authentication attempts or spoofing indicators within the network, leveraging Defender for Identity’s own telemetry and supplementary network security tools. 4) Patch Management: Although no patches are currently linked, organizations should prioritize applying any forthcoming security updates from Microsoft promptly. 5) Multi-Factor Authentication (MFA): Enforce MFA on all identity-related services to reduce the risk of unauthorized access even if spoofing attempts occur. 6) Incident Response Preparedness: Update incident response plans to include detection and response procedures for spoofing attacks targeting identity services. 7) Vendor Communication: Maintain active communication with Microsoft for updates, advisories, and guidance on this vulnerability. These targeted actions go beyond generic advice by focusing on network-level controls and identity-specific monitoring tailored to the nature of the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-02-12T22:35:41.551Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aeb948

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 9/10/2025, 3:12:28 AM

Last updated: 10/7/2025, 1:46:47 PM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats