New Azure AD Bug Lets Hackers Brute-Force Passwords Without Getting Caught

Microsoft azure active directory

Cybersecurity researchers have disclosed an unpatched security vulnerability in the protocol used by Microsoft Azure Active Directory that potential adversaries could abuse to stage undetected brute-force attacks.

“This flaw allows threat actors to perform single-factor brute-force attacks against Azure Active Directory (Azure AD) without generating sign-in events in the targeted organization’s tenant,” researchers from Secureworks Counter Threat Unit (CTU) said in a report published on Wednesday.

Automatic GitHub Backups

Azure Active Directory is Microsoft’s enterprise cloud-based identity and access management (IAM) solution designed for single sign-on (SSO) and multi-factor authentication. It’s also a core component of Microsoft 365 (formerly Office 365), with capabilities to provide authentication to other applications via OAuth.

The weakness resides in the Seamless Single Sign-On feature that allows employees to automatically sign when using their corporate devices that are connected to enterprise networks without having to enter any passwords. Seamless SSO is also an “opportunistic feature” in that if the process fails, the login falls back to the default behavior, wherein the user needs to…

http://feedproxy.google.com/~r/TheHackersNews/~3/jl8ybx4eMNQ/new-azure-ad-bug-lets-hackers-brute.html

New Azure AD Bug Lets Hackers Brute-Force Passwords Without Getting Caught 1
New Azure AD Bug Lets Hackers Brute-Force Passwords Without Getting Caught 2
New Azure AD Bug Lets Hackers Brute-Force Passwords Without Getting Caught 3
New Azure AD Bug Lets Hackers Brute-Force Passwords Without Getting Caught 4
New Azure AD Bug Lets Hackers Brute-Force Passwords Without Getting Caught 5

Have a comment? Type it below!