CVE-2026-35431

Microsoft · Entra ID

A Server-Side Request Forgery (SSRF) vulnerability in Microsoft Entra ID Entitlement Management allows unauthorized attackers to perform spoofing over a network.

Executive summary

A critical SSRF vulnerability in Microsoft Entra ID enables unauthenticated attackers to perform network spoofing, potentially leading to unauthorized access and internal resource manipulation.

Vulnerability

This SSRF vulnerability exists in the Entitlement Management component. It allows an unauthorized attacker to force the server to make requests to unintended locations, facilitating spoofing attacks.

Business impact

With a CVSS score of 10.0, this vulnerability presents an existential threat to cloud identity security. Unauthorized access to internal services or spoofing of trusted entities can lead to widespread identity compromise and unauthorized data exfiltration.

Remediation

Immediate Action: Apply all relevant security patches and configuration updates provided by Microsoft for Entra ID.

Proactive Monitoring: Audit logs for unusual outbound requests originating from the Entra ID environment and monitor for suspicious authentication patterns.

Compensating Controls: Implement strict egress filtering on cloud resources to prevent the server from reaching unauthorized internal or external endpoints.

Exploitation status

Public Exploit Available: No

Analyst recommendation

The extreme severity of this SSRF vulnerability necessitates an immediate audit and update of all Entra ID environments. Organizations must prioritize applying vendor-supplied patches to ensure the integrity of their identity infrastructure.