Microsoft Azure MFA Vulnerability Exposed: Accounts Cracked in Just One Hour

Microsoft Azure MFA Vulnerability Exposed: Accounts Cracked in Just One Hour

A critical vulnerability in Microsoft Azure’s Multi-Factor Authentication (MFA) system has raised alarms across the cybersecurity landscape. Researchers at Oasis Security discovered that a flaw in the system’s rate limit for failed login attempts allowed attackers to bypass MFA in just one hour, gaining unauthorized access to sensitive user accounts.

The breach impacted over 400 million paid Microsoft 365 accounts, exposing data stored in Outlook, OneDrive, Teams, and Azure Cloud environments.



The Flaw: What Went Wrong?

The vulnerability stemmed from a lack of rate limits on failed MFA login attempts, enabling attackers to execute brute-force attacks without detection. Here’s how it worked:

  1. Unlimited Attempts: Attackers rapidly created new login sessions and tested every possible combination of a 6-digit code (up to 1 million possibilities).
  2. Extended Code Validity: According to RFC-6238, a time-based one-time password (TOTP) should expire after 30 seconds. However, Microsoft’s system allowed codes to remain valid for approximately three minutes, giving attackers 6x more time to guess correctly.
  3. No Alerts: During repeated failed attempts, users received no notifications, making the attack undetectable in real-time.


The Exploit: Cracking MFA in an Hour

Oasis researchers demonstrated how an attacker could bypass MFA by:

  • Rapidly cycling through login attempts.
  • Exploiting the extended timeframe for valid MFA codes.

By leveraging these weaknesses, the researchers showed that an attacker could achieve a 50% success rate after only 24 attempts, taking approximately 70 minutes. In some tests, they succeeded even faster.

“Simply put—someone could perform many attempts at the same time,” noted Tal Hason, a research engineer at Oasis Security, in a Dec. 11 blog post.


Microsoft’s Response

Oasis Security reported the vulnerability to Microsoft in June 2023. The company acknowledged the flaw and implemented a fix on Oct. 9, 2023.


  • New Security Measures: Microsoft introduced stricter rate limits to throttle login attempts, locking accounts for half a day after exceeding the threshold.

While the exact changes remain confidential, the improvements address the exploit’s core weaknesses, enhancing MFA security for millions of users.


Lessons for Cybersecurity: Enhancing MFA Protections

The Microsoft Azure MFA exploit highlights the importance of robust safeguards in authentication systems. While MFA remains a critical layer of security, organizations must ensure its implementation aligns with best practices.

Key Takeaways for Organizations

  1. Enforce Rate Limits: Prevent brute-force attacks by capping login attempts and introducing temporary lockouts.
  2. Reduce OTP Validity Periods: Follow RFC-6238 standards to ensure one-time passwords expire promptly (within 30 seconds).
  3. Enable Account Alerts: Notify users of unusual login activity, including failed MFA attempts, to increase awareness and response times.
  4. Adopt Passwordless Solutions: Transition to advanced authentication methods, such as biometric verification or hardware tokens, to reduce reliance on traditional MFA codes.


Protect Your Business from Similar Threats

While Microsoft’s prompt response addressed this particular flaw, the incident underscores the need for vigilance in securing digital systems. With attackers constantly evolving their techniques, organizations must proactively assess and enhance their defenses.


Follow us on LinkedIn and Subscribe to our newsletter ?? for the latest cyber security updates, insightful articles, and exclusive content to help you navigate the ever-changing threat landscape.

Don't forget to check out our Website ?? to make your cyberspace safe and secure ??, and join our growing community on Instagram ?? for bite-sized cyber security tips and trends. ?? ??


#MicrosoftAzure #Cybersecurity #MFA #Authentication #TechInsights #C9Lab?

?

Tal Hason

R&D Team Lead @ Oasis Security

2 个月

Grateful for your support in sharing my vulnerability research. Let’s keep advancing the field together! ??

要查看或添加评论,请登录

C9LAB (Pinak Infosec Pvt. Ltd.)的更多文章

社区洞察

其他会员也浏览了