
The flaw allowed users with the Agent ID Administrator role to take control of arbitrary service principals across an organization’s tenant.
Although the role was intended to manage AI agent identities, a breakdown in permission boundaries enabled broader access than designed. Microsoft has since patched the issue across all cloud environments.
How the Vulnerability Worked
Microsoft Entra ID uses two key components when applications are registered:
- A global application object
- A local service principal that acts as the identity within a tenant
Service principals are critical because they authenticate, receive permissions, and access enterprise resources.

The issue arose because AI agent identities in Entra are built on the same infrastructure as service principals.
This shared architecture created a scoping gap, allowing the Agent ID Administrator role to interact with non-agent service principals.
Researchers from SilverFort demonstrated how attackers could exploit this flaw using a simple three-step process:
- Assign Ownership: Attackers could add themselves as owners of any service principal, bypassing intended restrictions.
- Generate Credentials: They could create new secrets or certificates for the compromised service principal.
- Authenticate as Target: Using these credentials, attackers could fully impersonate the service principal.

This effectively gave attackers full control over the targeted identity and its permissions.
Service principals often power critical enterprise systems such as:
- CI/CD pipelines
- Automation workflows
- Security tools and integrations
If a hijacked service principal holds elevated permissions such as Microsoft Graph access or administrative roles, attackers can instantly gain those privileges.
Notably, the vulnerability did not allow modification of higher-level application objects, limiting its scope. However, the impact on service principals alone is significant enough to pose a major security risk.
Another issue highlighted by researchers was the Entra interface itself.
The Agent ID Administrator role was not clearly labeled as privileged, increasing the likelihood that administrators might assign it without proper scrutiny.
This lack of visibility contributed to the potential misuse of the role in real-world environments.
Following responsible disclosure in February 2026, Microsoft addressed the issue and rolled out a fix by April 9, 2026.
The update ensures that the Agent ID Administrator role can no longer modify ownership of non-agent service principals.
Organizations should take the following steps to reduce risk:
- Monitor all privileged role assignments closely
- Audit changes to service principal ownership regularly
- Track newly created credentials for sensitive identities
- Treat service principals as critical infrastructure
This incident underscores a broader challenge: as new identity layers like AI agents are introduced, security boundaries must be carefully enforced to prevent unintended privilege escalation paths.
Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google
The post Hackers Can Abuse Agent ID Administrator Role to Hijack Service Principals appeared first on Cyber Security News.
Discover more from RSS Feeds Cloud
Subscribe to get the latest posts sent to your email.
