<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Enterprise Security Token Service — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/enterprise-security-token-service/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 07 May 2026 14:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/enterprise-security-token-service/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-40379 Microsoft Enterprise Security Token Service (ESTS) Spoofing Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-23-ests-spoofing/</link><pubDate>Thu, 07 May 2026 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-23-ests-spoofing/</guid><description>CVE-2026-40379 is a spoofing vulnerability in Microsoft Enterprise Security Token Service (ESTS) where exposure of sensitive information in Azure Entra ID allows an unauthorized attacker to perform spoofing over a network.</description><content:encoded><![CDATA[<p>CVE-2026-40379, disclosed on May 7, 2026, describes a spoofing vulnerability within the Microsoft Enterprise Security Token Service (ESTS) related to Azure Entra ID. This vulnerability can lead to the exposure of sensitive information to unauthorized actors, potentially allowing them to perform spoofing attacks over a network. The vulnerability lies within the ESTS component, and successful exploitation could allow an attacker to impersonate legitimate users or services within the Azure Entra ID environment. Defenders need to ensure proper configuration and monitoring of their Azure Entra ID environments to mitigate the risk posed by this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable ESTS configuration within an Azure Entra ID environment.</li>
<li>The attacker exploits CVE-2026-40379 to gain unauthorized access to sensitive information related to ESTS.</li>
<li>The exposed information is used to craft malicious security tokens.</li>
<li>The attacker uses the spoofed tokens to authenticate to other services within the Azure Entra ID environment.</li>
<li>The attacker gains access to resources and data that they are not authorized to access.</li>
<li>The attacker performs actions impersonating a legitimate user or service.</li>
<li>The attacker may escalate privileges within the Azure Entra ID environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40379 can lead to unauthorized access to sensitive resources and data within an organization&rsquo;s Azure Entra ID environment. An attacker could potentially impersonate legitimate users or services, leading to data breaches, financial loss, or disruption of business operations. The scope of the impact depends on the permissions and access levels of the compromised user or service.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor Azure Entra ID logs for suspicious authentication attempts and token issuance patterns that may indicate exploitation of CVE-2026-40379.</li>
<li>Deploy the provided Sigma rule to detect suspicious token activity based on CVE-2026-40379.</li>
<li>Review and harden ESTS configurations within Azure Entra ID to minimize the attack surface and potential for information exposure.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>entra_id</category><category>spoofing</category><category>cloud</category></item></channel></rss>