Microsoft Entra ID Agent ID Administrator Role – Service Principal Takeover
Scope: Microsoft Entra ID (All Tenants Using Agent Identities)
Severity: High
A scope overreach flaw in Microsoft Entra ID's Agent ID Administrator role — designed to manage AI agent identities — allowed users assigned to this role to take ownership of arbitrary service principals across the entire tenant, not just agent-related objects, enabling credential injection and full service principal takeover. Since 99% of enterprise tenants have at least one privileged service principal, successful exploitation could grant attackers directory-level permissions equivalent to Application Administrator, including access to CI/CD pipelines, Microsoft Graph integrations, and cloud infrastructure. Microsoft patched the flaw across all cloud environments on April 9, 2026; organizations should audit AuditLogs for unexpected service principal ownership changes or new credential creation events, and monitor the Agent ID Administrator role assignment activity closely.
The Uganda National CERT and Coordination Center (CERT.UG/CC) encourages users and administrators to review the recommendations and apply the necessary updates.