Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

774+ Articles
120+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-24303: Microsoft Partner Center Privilege Escalation via Improper Access Control
CVE-2026-24303: Microsoft Partner Center Privilege Escalation via Improper Access Control

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-24303

CVE-2026-24303: Microsoft Partner Center Privilege Escalation via Improper Access Control

A critical privilege escalation vulnerability in Microsoft Partner Center allows an authorized attacker to elevate their privileges over a network, achieving administrative access to partner management functions and downstream customer tenants.

Dylan H.

Security Team

April 24, 2026
6 min read

Affected Products

  • Microsoft Partner Center (Online)

Executive Summary

A critical privilege escalation vulnerability (CVE-2026-24303) has been disclosed in Microsoft Partner Center, Microsoft's cloud portal used by Managed Service Providers (MSPs), cloud solution providers, and technology partners to manage customer subscriptions, licenses, and tenant access. The vulnerability carries a CVSS score of 9.6 and stems from improper access control, allowing an authorized but lower-privileged attacker to escalate their network privileges within Partner Center — potentially gaining unauthorized administrative access to customer tenant management functions.


Vulnerability Overview

AttributeValue
CVE IDCVE-2026-24303
CVSS Score9.6 (Critical)
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow (authorized user)
User InteractionNone
Affected PlatformMicrosoft Partner Center (Online)
Vulnerability TypeImproper Access Control (CWE-284)
PublishedApril 23, 2026

Affected Products

ProductDeploymentStatus
Microsoft Partner CenterOnline (Cloud)Vulnerable — patch in progress

Technical Analysis

Root Cause

CVE-2026-24303 is rooted in improper access control within the Microsoft Partner Center platform. Access control enforcement failures of this type typically manifest as missing authorization checks on sensitive API endpoints, insecure direct object references, or role-based access control (RBAC) bypass conditions that allow a lower-privileged identity to invoke operations reserved for administrators.

In the Partner Center context, this is especially high-impact: the platform provides privileged access mechanisms including Delegated Administration Privileges (DAP) and Granular Delegated Admin Privileges (GDAP), which grant partners the ability to administer their customers' Microsoft 365, Azure, and Dynamics 365 tenants. An attacker who escalates privileges within Partner Center could abuse these mechanisms.

Attack Scenario

1. Attacker obtains low-level authorized access to a target organization's Partner Center account
   (e.g., through a compromised partner employee credential, phishing, or insider threat)
2. Attacker exploits CVE-2026-24303 to escalate from low-level role to administrative role
3. With elevated privileges, attacker can:
   a. Access delegated admin functions across all managed customer tenants
   b. Modify customer subscriptions, licenses, and billing configurations
   c. Create new admin accounts in customer Azure AD / Entra ID tenants
   d. Exfiltrate sensitive customer configuration data and access tokens
4. Attacker leverages customer tenant admin access for further compromise

Why CVSS 9.6

MetricValueReason
Low privilegesPR:LOnly a basic authorized account is needed to initiate the attack
Network accessibleAV:NExploitable over the internet via the Partner Center web platform
No user interactionUI:NThe escalation is server-side with no victim action required
High impactC:H/I:H/A:HAdmin access to partner & customer tenants yields full compromise

Impact Assessment

Microsoft Partner Center is a critical hub for the Microsoft Cloud Solution Provider (CSP) ecosystem. Partners manage hundreds or thousands of customer tenants through this platform.

Impact AreaDescription
Customer Tenant CompromiseEscalated privileges can be used to access delegated admin rights over customer Azure & M365 tenants
Supply Chain RiskA single compromised partner account can cascade to all managed customers
Data ExfiltrationAccess to customer billing, license, and configuration data
Account TakeoverCreation of new admin accounts in customer Entra ID / Azure AD
License ManipulationUnauthorized subscription changes, license provisioning, or cancellation
Financial FraudModification of billing configurations or partner incentive claims

Remediation

Step 1: Apply Microsoft's Patch

Microsoft is expected to deliver a fix for CVE-2026-24303 through the standard Azure/Microsoft Online service update mechanism. Cloud-hosted services receive patches automatically; verify your Partner Center environment reflects the latest service version.

1. Log into Microsoft Partner Center: https://partner.microsoft.com
2. Check Service Health dashboard for any active advisories related to CVE-2026-24303
3. Review Microsoft Security Update Guide for patch confirmation

Step 2: Audit Partner Center Accounts Immediately

# Use Partner Center PowerShell module to enumerate admin role assignments
Install-Module -Name PartnerCenter -Force
Connect-PartnerCenter
 
# List all users with admin roles
Get-PartnerCustomerUser -CustomerId <tenant_id> | Where-Object {$_.Roles -ne $null}
 
# Review recent admin activity in Partner Center audit logs
Get-PartnerAuditRecord -StartDate (Get-Date).AddDays(-30) | 
  Where-Object {$_.OperationType -in @("AddUser","UpdateUser","AssignRole")}

Step 3: Enforce Granular Delegated Admin Privileges (GDAP)

Migrate from broad Delegated Administration Privileges (DAP) to the more restrictive GDAP model:

- Remove all DAP relationships and replace with GDAP
- Apply least-privilege roles (e.g., Global Reader instead of Global Admin)
- Set expiry dates on all GDAP relationships
- Require MFA for all partner admin accounts accessing GDAP resources

Step 4: Enable Conditional Access for Partner Accounts

1. Navigate to Entra ID (Azure AD) > Security > Conditional Access
2. Create a policy requiring:
   - MFA for all Partner Center access
   - Compliant device requirement for admin operations
   - Named location restrictions (limit to known corporate IP ranges)
3. Enable Sign-in Risk policies to block high-risk Partner Center logins

Detection Indicators

IndicatorDescription
Unexpected role assignments in Partner Center audit logsPossible privilege escalation
New global admin accounts created in customer tenantsPost-escalation persistence
Login from unfamiliar geographies or IP addressesAccount compromise indicator
Unusual subscription or license changes across multiple customersPost-exploitation abuse
GDAP or DAP relationship modifications outside change windowsUnauthorized access control changes
Partner Center API calls from unexpected service principalsToken abuse post-compromise

Post-Remediation Checklist

  1. Apply Microsoft's security update for CVE-2026-24303 once released
  2. Audit all Partner Center user roles and remove unnecessary elevated access
  3. Migrate all DAP relationships to GDAP with least-privilege roles
  4. Enable MFA enforcement for all Partner Center accounts
  5. Review audit logs for unexpected role escalations in the past 30–90 days
  6. Inspect all managed customer tenants for unauthorized admin account creation
  7. Rotate Partner Center API credentials and service principal secrets
  8. Notify affected customers if unauthorized tenant access is detected
  9. Implement Conditional Access policies restricting Partner Center access by location and device compliance
  10. Monitor Partner Center alerts and Microsoft Secure Score recommendations

References

  • NVD — CVE-2026-24303
  • Microsoft Security Update Guide
  • Microsoft Partner Center Security Requirements
  • GDAP Migration Guide
#CVE-2026-24303#Microsoft#Partner Center#Privilege Escalation#Access Control#CVSS 9.6#Cloud Security

Related Articles

CVE-2026-26135: Azure Custom Locations SSRF Enables Privilege Escalation (CVSS 9.6)

A critical server-side request forgery vulnerability in Azure Custom Locations Resource Provider allows an authorized attacker to elevate privileges over...

6 min read

CVE-2026-32210: Microsoft Dynamics 365 Online SSRF Enables Unauthenticated Network Spoofing

A critical server-side request forgery vulnerability in Microsoft Dynamics 365 (Online) allows an unauthenticated remote attacker to perform spoofing over a network, with a CVSS score of 9.3.

6 min read

CVE-2026-5412: Juju Controller Facade Allows Low-Privilege Cloud Credential Theft

An authorization flaw in Juju's Controller facade allows any authenticated low-privilege user to call the CloudSpec API and extract the cloud provider...

7 min read
Back to all Security Alerts