Description
Improper privilege management in Azure Entra ID allows an unauthorized attacker to elevate privileges over a network.
Published: 2026-05-22
Score: 7.5 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability stems from improper privilege management within Azure Entra ID, enabling an unauthorized attacker to gain elevated privileges across a network. This privilege escalation can allow the attacker to act with higher–level permissions, facilitating unauthorized access to protected resources, modification of data, or compromise of system integrity. The weakness is identified as CWE‑269.

Affected Systems

Affected systems include Microsoft Global Secure Access (GSA) provided by Microsoft. While the CVE does not specify particular versions, the issue exists within the Azure Entra ID component of GSA. Administrators should confirm whether their deployment is using a version that may incorporate the affected component, especially if they rely on Azure Entra ID for identity and access management.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity risk, but EPSS is not available, so the current likelihood of exploitation cannot be quantified. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector involves a network‑based attacker exploiting the privilege management flaw through Azure Entra ID services. The lack of patch status in the data suggests that users should seek current patches or guidance from Microsoft to mitigate this risk.

Generated by OpenCVE AI on May 22, 2026 at 23:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check Microsoft’s security update guide for Microsoft Global Secure Access and apply any available patch or update that addresses CVE‑2026‑23663.
  • Restrict network traffic to Azure Entra ID and GSA services by limiting allowed IP ranges to trusted administrators or using network segmentation.
  • Enforce strict role‑based access control within Azure Entra ID, ensuring that users have only the minimum permissions needed, and monitor for any unauthorized privilege changes.

Generated by OpenCVE AI on May 22, 2026 at 23:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 22 May 2026 22:30:00 +0000

Type Values Removed Values Added
Description Improper privilege management in Azure Entra ID allows an unauthorized attacker to elevate privileges over a network.
Title Microsoft Global Secure Access (GSA) Information Disclosure Vulnerability
First Time appeared Microsoft
Microsoft global Secure Access
Weaknesses CWE-269
CPEs cpe:2.3:a:microsoft:global_secure_access:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft global Secure Access
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Global Secure Access
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-05-22T22:04:41.483Z

Reserved: 2026-01-14T16:59:33.463Z

Link: CVE-2026-23663

cve-icon Vulnrichment

No data.

cve-icon NVD

No data.

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-22T23:30:03Z

Weaknesses