Cilium: The Reference Architecture for High-Performance Networking & Security
TL;DR Kubernetes networking has long been a bottleneck, hindered by outdated Linux technologies …

A critical look at CVE-2025-55241
On September 18, golem.de reported a security vulnerability in Microsoft Entra ID, discovered by security researcher Dirk-Jan Mollema, who described it as “probably the most significant Entra ID security vulnerability” of his career. Registered as CVE-2025-55241 and rated as critical with a CVSS score of 9.0, the case exemplifies how vulnerable central identity and access platforms can be.
At its core, the vulnerability is based on the misuse of so-called Actor-Tokens—internal tokens that Microsoft uses for service-to-service communication. Combined with a bug in the Graph API for Azure Active Directory, Mollema demonstrated that these tokens could be repurposed to gain access to foreign tenants.
Particularly critical:
This would allow an attacker not only to take over user accounts but also to create identities, change permissions, and manipulate configurations—without the affected organization even noticing.
Entra ID (formerly Azure Active Directory) is the central instance for identity and access management for many companies. It manages Single Sign-On, Multi-Factor Authentication, and is an integral part of countless cloud workloads. A vulnerability at this level means that the entire security architecture of a company can be compromised—from email access to internal systems to cloud applications.
Especially in Kubernetes environments, where Entra ID is often used for authenticating developers and service accounts, such a vulnerability could have devastating effects on the entire container infrastructure.
Additionally, according to Mollema, the required tenant ID and NetID of a user could be relatively easily obtained—via API access or brute force. This makes the theoretical exploitation of the vulnerability not only highly dangerous but also feasible.
Mollema reported the vulnerability on July 14, 2025. Within three days, Microsoft released an initial fix, followed by further patches on August 6. However, the vulnerability was not publicly communicated until about a month later.
The quick action in addressing the issue is commendable. Nevertheless, the incident shows that it is not just about patching individual vulnerabilities but about the fundamental question of whether such a central dependency on a single platform is sustainable.
The case highlights two key points:
For companies, this means: Even if providers like Microsoft react quickly, their own security strategy must focus on defense-in-depth, independent control mechanisms, and potentially hybrid or sovereign alternatives.
Solutions like Authentik or Keycloak offer alternatives for self-managed identity management, while Zitadel enables modern zero-trust architectures. These can be operated in Kubernetes clusters and offer full control over identity data and authentication processes.
TL;DR Kubernetes networking has long been a bottleneck, hindered by outdated Linux technologies …
How Seemingly “Sovereign” Cloud Offerings Disguise Dependencies – and What ZenDiS …
Germany has transposed the European NIS2 directive into national law with considerable delay. The …