Skip to main content
Version: 2.1.1-preview

MT.1050 - Apps with high-risk permissions having a direct path to Global Admin

Overview

Ensure no Microsoft Entra ID applications or service principals have Graph permissions with a risk of having a direct or indirect path to a Global Admin or a full tenant takeover.

The tested permissions are based on the research published at Microsoft Application permissions tiering by Emilien Socchi.

This test checks if any application has tier-0 graph permissions with a risk of having a direct or indirect path to a Global Admin or a full tenant takeover.

Note:
There are several use cases where Tier-0 permissions with an indirect attack path are required. For example, Maester itself requires the permission 'RoleEligibilitySchedule.ReadWrite.Directory' to properly validate the PIM assignments. Nevertheless, an administrator should question the use of these permissions and check whether less critical permissions are also sufficient. Applications provided by third-party vendors that do have Tier-0 permissions with direct or indirect attack paths should strictly be questioned and monitored.

Following table is a shortened copy from Application permissions - Tier 0: Family of Global Admins, Date: 05.03.2025, Release v2.1.0

Application permissionPath typeKnown shortest path
AdministrativeUnit.ReadWrite.AllIndirectWhen combined with other types of access allowing to reset user passwords, can remove a Global Admin from a Restricted Management Administrative Unit (RMAU) and take it over.
Application.ReadWrite.AllIndirectCan impersonate any SP with more privileged application permissions granted for MS Graph, and impersonate it to escalate to Global Admin.
Application.ReadWrite.OwnedByIndirectSame as Application.ReadWrite.All, but the impersonation is limited to the SP(s) for which the compromised SP is an owner.
AppRoleAssignment.ReadWrite.AllIndirectCan assign the RoleManagement.ReadWrite.Directory permission to the compromised SP without requiring admin consent, and escalate to Global Admin.
DeviceManagementConfiguration.ReadWrite.AllIndirectCan run arbitrary commands on the InTune-managed endpoint of a Global Administrator and steal their tokens to impersonate them.
DeviceManagementRBAC.ReadWrite.AllIndirectCan assign InTune roles to a controlled user account, which allows running arbitrary commands on the InTune-managed endpoint of a Global Administrator and steal their tokens to impersonate them.
Directory.ReadWrite.AllIndirectCan become member of a non-role-assignable user group with assigned privileged Azure permissions, and leverage Azure resources to escalate to Global Admin.
Note: can also acquire access to external solutions integrated with Entra ID via SSO, and providing access based on non-role-assignable group memberships.
Domain.ReadWrite.AllIndirectCan add a federated domain to Entra ID and authenticate as an existing Global Admin without password or MFA requirements.
EntitlementManagement.ReadWrite.AllIndirectCan update the assignment policy of an access package provisioning access to Global Admin, so that requesting the package without approval is possible from a controlled user account.
Group.ReadWrite.AllIndirectSame as Directory.ReadWrite.All.
GroupMember.ReadWrite.AllIndirectSame as Directory.ReadWrite.All.
Organization.ReadWrite.AllIndirectIf Certificate Based Authentication (CBA) is enabled in the tenant, can upload a trusted root certificate to Entra ID and impersonate a Global Admin.
Policy.ReadWrite.AuthenticationMethodIndirectWhen combined with UserAuthenticationMethod.ReadWrite.All, can enable the Temporary Access Pass (TAP) authentication method to help leveraging and follow the same path as that permission.
Policy.ReadWrite.ConditionalAccessDirectCan create a CAP blocking all users (including break-glass accounts) for all applications (making the tenant unavailable), and ask for a ransomware to remove the malicious CAP.
Note: this role is "Global-Admin-like", as it affects the availability of the tenant in the same way as a Global Admin.
Policy.ReadWrite.PermissionGrantIndirectCan create a permission grant policy for the compromised SP with the RoleManagement.ReadWrite.Directory permission, and leverage that policy to follow the same path as that permission and escalate to Global Admin.
PrivilegedAssignmentSchedule.ReadWrite.AzureADGroupDirectSame as PrivilegedAccess.ReadWrite.AzureADGroup.
PrivilegedEligibilitySchedule.ReadWrite.AzureADGroupIndirectCan make a controlled user account eligible to a group with an active Global Admin assignment, and activate the group membership to escalate to Global Admin.
RoleAssignmentSchedule.ReadWrite.DirectoryDirectCan assign the Global Admin role to a controlled user account, by creating an active PIM role assignment.
RoleEligibilitySchedule.ReadWrite.DirectoryIndirectCan make a controlled user account eligible to the Global Admin role, and activate it to escalate to Global Admin.
RoleManagement.ReadWrite.DirectoryDirectCan assign the Global Admin role to a controlled principal.
RoleManagementPolicy.ReadWrite.AzureADGroupIndirectCan remove group role assignment and activation constrains, such as MFA requirements or admin approval, to help leveraging PrivilegedAccess.ReadWrite.AzureADGroup, PrivilegedAssignmentSchedule.ReadWrite.AzureADGroup or PrivilegedEligibilitySchedule.ReadWrite.AzureADGroup, and follow the same path as those permissions in a tenant with strict PIM settings.
RoleManagementPolicy.ReadWrite.DirectoryIndirectCan remove Entra role assignment and activation constrains, such as MFA requirements or admin approval, to help leveraging RoleAssignmentSchedule.ReadWrite.Directory or RoleEligibilitySchedule.ReadWrite.Directory, and follow the same path as those permissions in a tenant with strict PIM settings.
User.DeleteRestore.AllDirectCan delete all user accounts in the tenant (making the latter unavailable), and ask for a ransomware to restore one of the break-glass accounts.
Note: this permission is "Global-Admin-like", as it affects the availability of the tenant in the same way as a Global Admin.
User.EnableDisableAccount.AllDirectWhen combined with User.Read.All, can disable all user accounts in the tenant (making the latter unavailable), and ask for a ransomware to re-enable one of the break-glass accounts.
Note: this permission is "Global-Admin-like", as it affects the availability of the tenant in the same way as a Global Admin.
User.ReadWrite.AllIndirectCan edit sensitive properties of a controlled user account, such as "Employee ID" and "Department", to become member of a dynamic group with assigned privileged Azure permissions, and leverage Azure resources to escalate to Global Admin.
User-PasswordProfile.ReadWrite.AllIndirectSame as Directory.ReadWrite.All.
UserAuthenticationMethod.ReadWrite.AllDirectCan generate a Temporary Access Pass (TAP) and take over any user account in the tenant.
Note: if TAP is not an enabled authentication method in the tenant, this path needs to be combined with Policy.ReadWrite.AuthenticationMethod to be successful.

Remediation action:

To check the applications permissions:

  1. Navigate to Microsoft Entra admin center https://entra.microsoft.com/.
  2. Click to expand Applications then select App registrations.
  3. Select All applications.
  4. Search for the application that you want to check and select the application.
  5. Select API permissions.
  6. Check the Microsoft Graph permissions.
  7. Verify that only authorized users have access to this application and its secrets.

Test Metadata

FieldValue
Test IDMT.1050
SeverityHigh
SuiteMaester
CategoryApp
PowerShell testTest-MtHighRiskAppPermissions
TagsApp, Entra, Graph, LongRunning, MT.1050, Preview

Source

  • Pester test: tests/Maester/Entra/Test-MtHighRiskAppPermissions.Tests.ps1
  • PowerShell source: powershell/public/maester/entra/Test-MtHighRiskAppPermissions.ps1