• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
critical 'noauth' flaw in microsoft azure ad enabled complete account

Critical ‘nOAuth’ Flaw in Microsoft Azure AD Enabled Complete Account Takeover

You are here: Home / General Cyber Security News / Critical ‘nOAuth’ Flaw in Microsoft Azure AD Enabled Complete Account Takeover
June 21, 2023

A security shortcoming in Microsoft Azure Energetic Directory (Advertisement) Open Authorization (OAuth) approach could have been exploited to obtain full account takeover, scientists claimed.

California-centered id and accessibility management services Descope, which found and noted the issue in April 2023, dubbed it nOAuth.

“nOAuth is an authentication implementation flaw that can have an effect on Microsoft Azure Advert multi-tenant OAuth programs,” Omer Cohen, chief security officer at Descope, reported.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The misconfiguration has to do with how a malicious actor can modify email attributes beneath “Call Facts” in the Azure Advertisement account and exploit the “Log in with Microsoft” function to hijack a victim account.

Cybersecurity

To pull off the attack, all an adversary has to do is to produce and obtain an Azure Ad admin account and modify their email deal with to that of a sufferer and consider benefit of the one sign-on scheme on a vulnerable app or site.

“If the application merges person accounts without having validation, the attacker now has full manage above the victim’s account, even if the target doesn’t have a Microsoft account,” Cohen discussed.

Productive exploitation grants the adversary an “open up subject” to established up persistence, exfiltrate facts, and have out other submit-exploitation actions dependent on the nature of the app.

This stems from the reality that an email tackle is both equally mutable and unverified in Azure Ad, prompting Microsoft to issue a warning not to use email promises for authorization needs.

Approaching WEBINAR🔐 Mastering API Security: Comprehending Your Genuine Attack Area

Learn the untapped vulnerabilities in your API ecosystem and just take proactive techniques towards ironclad security. Sign up for our insightful webinar!

Join the Session.wn-button,.wn-label,.wn-label:right afterscreen:inline-block.examine_two_webinarmargin:20px 10px 30px 0background:#f9fbffcolor:#160755padding: 5%border:2px strong #d9deffborder-radius:10pxtext-align:leftbox-shadow:10px 10px #e2ebff-webkit-border-leading-remaining-radius:25px-moz-border-radius-topleft:25px-webkit-border-bottom-proper-radius:25px-moz-border-radius-bottomright:25px.wn-labelfont-measurement:13pxmargin:20px 0font-excess weight:600letter-spacing:.6pxcolor:#596cec.wn-label:followingwidth:50pxheight:6pxcontent:”border-top:2px sound #d9deffmargin: 8px.wn-titlefont-dimensions:21pxpadding:10px 0font-weight:900text-align:leftline-height:33px.wn-descriptiontext-align:leftfont-dimensions:15.6pxline-top:26pxmargin:5px !importantcolor:#4e6a8d.wn-buttonpadding:6px 12pxborder-radius:5pxbackground-shade:#4469f5font-sizing:15pxcolor:#fff!importantborder:0line-top:inherittext-decoration:none!importantcursor:pointermargin:15px 20pxfloat:leftfont-fat:500letter-spacing:.2px

The tech giant characterised the issue as an “insecure anti-sample made use of in Azure Advertisement (AAD) programs” wherever the use of the email claim from obtain tokens for authorization can lead to an escalation of privilege.

“An attacker can falsify the email claim in tokens issued to purposes,” it noted. “Moreover, the danger of details leakage exists if apps use this kind of promises for email lookup.”

It also said it identified and notified many multi-tenant applications with end users that make use of an email handle with an unverified area owner.

Observed this report appealing? Follow us on Twitter  and LinkedIn to browse additional unique material we post.


Some sections of this posting are sourced from:
thehackernews.com

Previous Post: «chinese hacker group 'flea' targets american ministries with graphican backdoor Chinese Hacker Group ‘Flea’ Targets American Ministries with Graphican Backdoor
Next Post: Startup Security Tactics: Friction Surveys startup security tactics: friction surveys»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms
  • Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
  • 6 Steps to 24/7 In-House SOC Success
  • Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider
  • 67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers
  • New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft
  • BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware
  • Secure Vibe Coding: The Complete New Guide
  • Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session
  • Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign

Copyright © TheCyberSecurity.News, All Rights Reserved.