• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
critical 'noauth' flaw in microsoft azure ad enabled complete account

Critical ‘nOAuth’ Flaw in Microsoft Azure AD Enabled Complete Account Takeover

You are here: Home / General Cyber Security News / Critical ‘nOAuth’ Flaw in Microsoft Azure AD Enabled Complete Account Takeover
June 21, 2023

A security shortcoming in Microsoft Azure Energetic Directory (Advertisement) Open Authorization (OAuth) approach could have been exploited to obtain full account takeover, scientists claimed.

California-centered id and accessibility management services Descope, which found and noted the issue in April 2023, dubbed it nOAuth.

“nOAuth is an authentication implementation flaw that can have an effect on Microsoft Azure Advert multi-tenant OAuth programs,” Omer Cohen, chief security officer at Descope, reported.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The misconfiguration has to do with how a malicious actor can modify email attributes beneath “Call Facts” in the Azure Advertisement account and exploit the “Log in with Microsoft” function to hijack a victim account.

Cybersecurity

To pull off the attack, all an adversary has to do is to produce and obtain an Azure Ad admin account and modify their email deal with to that of a sufferer and consider benefit of the one sign-on scheme on a vulnerable app or site.

“If the application merges person accounts without having validation, the attacker now has full manage above the victim’s account, even if the target doesn’t have a Microsoft account,” Cohen discussed.

Productive exploitation grants the adversary an “open up subject” to established up persistence, exfiltrate facts, and have out other submit-exploitation actions dependent on the nature of the app.

This stems from the reality that an email tackle is both equally mutable and unverified in Azure Ad, prompting Microsoft to issue a warning not to use email promises for authorization needs.

Approaching WEBINAR🔐 Mastering API Security: Comprehending Your Genuine Attack Area

Learn the untapped vulnerabilities in your API ecosystem and just take proactive techniques towards ironclad security. Sign up for our insightful webinar!

Join the Session.wn-button,.wn-label,.wn-label:right afterscreen:inline-block.examine_two_webinarmargin:20px 10px 30px 0background:#f9fbffcolor:#160755padding: 5%border:2px strong #d9deffborder-radius:10pxtext-align:leftbox-shadow:10px 10px #e2ebff-webkit-border-leading-remaining-radius:25px-moz-border-radius-topleft:25px-webkit-border-bottom-proper-radius:25px-moz-border-radius-bottomright:25px.wn-labelfont-measurement:13pxmargin:20px 0font-excess weight:600letter-spacing:.6pxcolor:#596cec.wn-label:followingwidth:50pxheight:6pxcontent:”border-top:2px sound #d9deffmargin: 8px.wn-titlefont-dimensions:21pxpadding:10px 0font-weight:900text-align:leftline-height:33px.wn-descriptiontext-align:leftfont-dimensions:15.6pxline-top:26pxmargin:5px !importantcolor:#4e6a8d.wn-buttonpadding:6px 12pxborder-radius:5pxbackground-shade:#4469f5font-sizing:15pxcolor:#fff!importantborder:0line-top:inherittext-decoration:none!importantcursor:pointermargin:15px 20pxfloat:leftfont-fat:500letter-spacing:.2px

The tech giant characterised the issue as an “insecure anti-sample made use of in Azure Advertisement (AAD) programs” wherever the use of the email claim from obtain tokens for authorization can lead to an escalation of privilege.

“An attacker can falsify the email claim in tokens issued to purposes,” it noted. “Moreover, the danger of details leakage exists if apps use this kind of promises for email lookup.”

It also said it identified and notified many multi-tenant applications with end users that make use of an email handle with an unverified area owner.

Observed this report appealing? Follow us on Twitter  and LinkedIn to browse additional unique material we post.


Some sections of this posting are sourced from:
thehackernews.com

Previous Post: «chinese hacker group 'flea' targets american ministries with graphican backdoor Chinese Hacker Group ‘Flea’ Targets American Ministries with Graphican Backdoor
Next Post: Startup Security Tactics: Friction Surveys startup security tactics: friction surveys»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.