Description
Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. From 3.0.0 to before 3.1.0, if Himmelblau is deployed without a configured tenant domain in himmelblau.conf, authentication is not tenant-scoped. In this mode, Himmelblau can accept authentication attempts for arbitrary Entra ID domains by dynamically registering providers at runtime. This behavior is intended for initial/local bootstrap scenarios, but it can create risk in remote authentication environments. This vulnerability is fixed in 3.1.0.
Published: 2026-03-11
Score: 10 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Cross‑tenant Authentication
Action: Immediate Patch
AI Analysis

Impact

Himmelblau, an interoperability suite for Microsoft Azure Entra ID and Intune, allows authentication to proceed when the per‑tenant domain configuration is omitted in the configuration file. In this state the software will accept authentication attempts for any Entra ID domain by dynamically creating a provider during the login process. This unscoped behavior enables an attacker to authenticate as a user from any tenant, effectively bypassing tenant isolation. The weakness corresponds to CWE‑1188, "Improper Constrained Use of a Resource." The described impact is the ability for an attacker to gain unauthorized access to user accounts and potentially access data within those tenants without legitimate credentials.

Affected Systems

Affected versions are Himmelblau 3.0.0 through, but not including, 3.1.0. The product is himmelblau-idm:himmelblau, identified by the CPE string cpe:2.3:a:himmelblau-idm:himmelblau:*:*:*:*:*:*:*:*.

Risk and Exploitability

The CVSS score of 10 indicates critical severity. The EPSS score is less than 1 %, suggesting a low probability of recent exploitation. The vulnerability is not listed in the CISA KEV catalog. The attack vector is remote: an attacker only needs to trigger the authentication flow against an instance that lacks a configured tenant domain. Once the flaw is triggered, the attacker can log in as any user from any Entra ID tenant, potentially obtaining full access to that tenant’s resources.

Generated by OpenCVE AI on March 17, 2026 at 16:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Himmelblau to version 3.1.0 or later
  • Verify that a tenant domain is configured in himmelblau.conf to enforce tenant‑scoped authentication

Generated by OpenCVE AI on March 17, 2026 at 16:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 16 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:himmelblau-idm:himmelblau:*:*:*:*:*:*:*:*

Thu, 12 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Himmelblau-idm
Himmelblau-idm himmelblau
Vendors & Products Himmelblau-idm
Himmelblau-idm himmelblau

Wed, 11 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
Description Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. From 3.0.0 to before 3.1.0, if Himmelblau is deployed without a configured tenant domain in himmelblau.conf, authentication is not tenant-scoped. In this mode, Himmelblau can accept authentication attempts for arbitrary Entra ID domains by dynamically registering providers at runtime. This behavior is intended for initial/local bootstrap scenarios, but it can create risk in remote authentication environments. This vulnerability is fixed in 3.1.0.
Title Himmelblau unset domain configuration can allow any-tenant authentication at first login for remote deployments
Weaknesses CWE-1188
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

Himmelblau-idm Himmelblau
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-12T20:00:41.000Z

Reserved: 2026-03-10T15:40:10.480Z

Link: CVE-2026-31957

cve-icon Vulnrichment

Updated: 2026-03-12T20:00:37.797Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-11T20:16:16.447

Modified: 2026-03-16T19:39:37.913

Link: CVE-2026-31957

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:29:18Z

Weaknesses