AuthQuake: Critical MFA Vulnerability Exposed in Microsoft’s Security

  • Thread Author
In a significant development for cybersecurity within the Microsoft ecosystem, Oasis Security's research team has discovered and helped resolve a critical vulnerability in Microsoft's Multi-Factor Authentication (MFA) system, affecting over 400 million Office 365 users. Dubbed "AuthQuake," this vulnerability would have permitted attackers to bypass MFA protections and gain unauthorized access to user accounts, potentially providing them access to sensitive data stored on platforms like Outlook, OneDrive, Teams, and Azure Cloud services.

The Discovery​

This troublesome flaw was unveiled back in June 2024, revealing a gaping hole in Microsoft’s MFA implementation. At the heart of the issue was a lack of proper rate limiting for authentication attempts. Rate limiting is essentially a control measure that restricts the number of times a user or system can attempt something—in this case, entering the 6-digit verification code required for MFA. Without it, attackers had free rein to launch concurrent attempts at guesswork.
What made this vulnerability truly alarming was its straightforward execution. Cybercriminals could potentially execute the exploit in around 70 minutes, without any user interaction, and, perhaps most startlingly, without generating notifications to alert the users of these unauthorized login attempts. According to the research team’s findings, attackers would stand a better than 50% chance of success in cracking a valid authentication code during that timeframe.

Technical Analysis​

Delving deeper into the mechanics of this vulnerability, the researchers highlighted a significant technical oversight in the MFA implementation: Microsoft allowed a validation window of up to three minutes for each verification code, which starkly contrasts with the recommended 30-second window prescribed by the RFC-6238 regulations. This extended timeframe, compounded by the ability to simultaneously make multiple attempts, created a veritable carta blanca for attackers.
As a result of this exploit, where a determined attacker could guess codes at high speed, the entire MFA framework became increasingly less secure, undermining what is typically considered a fortress of user authentication.

Microsoft’s Response​

Upon discovery, Microsoft acted swiftly to patch the vulnerability. They enforced stricter rate limiting measures that would trigger after a set number of failed authentication attempts, and these limitations would sustain for around 12 hours, effectively closing the window on this exploit.
However, experts in the industry emphasize that while Microsoft's swift action is commendable, organizations must not rest on their laurels. Taking additional protective measures is crucial. Recommendations include:
  • Enabling Alerts: Set up systems to alert users on failed MFA attempts to increase awareness and vigilance against suspicious activities.
  • Regular Password Rotation: Encourage users to update their passwords routinely, limiting the effectiveness of potential breaches.

Broader Implications​

Though MFA is heralded as an essential best practice for safeguarding digital identities, incidents like AuthQuake underscore the critical importance of not only implementing security measures but doing so with diligence and regular monitoring. It's a sobering reminder that cybersecurity is not a one-time setup but a continuous engagement requiring vigilance.
In closing, this incident is a clarion call for all organizations leveraging cloud services to assess their security hygiene comprehensively. Even the giants like Microsoft can falter, but learning from these oversights can pave the way for robust security practices, keeping users' data safe and secure.
So, as a Windows user or administrator, continue to leverage MFA, but do so with an understanding of its limitations. What additional measures have you implemented in your organization to safeguard against similar vulnerabilities? Let's discuss!

Source: Cyber Kendra Microsoft Patched Azure MFA Bypass Vulnerability - AuthQuake
 


Back
Top