Microsoft MFA AuthQuake Vulnerability Allowed Unlimited Brute-Force Attempts Without Notifications

Critical Vulnerability Discovered in Microsoft MFA Implementation

Cybersecurity experts have uncovered a significant security flaw in Microsoft’s multi-factor authentication (MFA) system that could allow attackers to easily bypass protection mechanisms and gain unauthorized access to user accounts. This vulnerability was classified as “critical” by researchers from Oasis Security, who highlighted the potential for exploitation without any required user interaction, making it particularly insidious.

The researchers, Elad Luz and Tal Hason, reported that the process to exploit the vulnerability—codenamed “AuthQuake”—was alarmingly simple and could be completed in approximately an hour. There would be no alerts or notifications for the account holder, leaving them unaware of any unauthorized access attempts. Microsoft addressed this issue in October 2024 following responsible disclosure from the Oasis team.

Various MFA methods are utilized by Microsoft to authenticate users, including a six-digit code provided by an authenticator app. The system allows for up to ten failed login attempts in succession before any protective measures kick in. The lack of a stringent rate limit, combined with an extended timeframe for code validation, poses a risk. Attackers can rapidly generate new sessions and test all one-million possible code permutations without notifying the target.

The one-time codes, or time-based one-time passwords (TOTPs), are designed to be temporary, typically valid for about 30 seconds. However, due to potential discrepancies in time between the code validator and the user’s device, the validation period may be extended, allowing a single TOTP code to remain valid for up to three minutes. This extended window significantly enhances the probability of a successful brute-force attack, where an attacker exploits the delayed validation period to conduct multiple attempts in quick succession.

In response to these findings, Microsoft has implemented stricter rate limiting measures that activate after a series of failed attempts. The new protocol is designed to remain in effect for roughly half a day. However, cybersecurity experts like James Scobey, chief information security officer at Keeper Security, stress that MFA’s effectiveness relies heavily on proper configuration. Key configurations, such as rate limiting and user notifications for failed log-ins, are essential to bolster security and enable users to detect suspicious activities promptly.

In addition to the vulnerabilities identified in the MFA system, this situation underscores critical adversary tactics outlined in the MITRE ATT&CK framework. Techniques such as initial access, persistence, and brute-force credential guessing are particularly relevant in understanding the potential methods exploited during this incident.

Given the pervasive reliance on MFA as a security measure, attention must be directed towards ensuring that these systems are not just deployed but are optimally configured to provide the intended level of protection. As cybersecurity threats continue to evolve, organizations must remain vigilant and proactive about the security measures they have in place.

For business owners and cybersecurity professionals, the emergence of the AuthQuake vulnerability serves as a stark reminder of the complexities involved in protecting sensitive information. Effective security cannot merely rely on the implementation of MFA; ongoing assessment and enhancement of security protocols are paramount to counteract these evolving threats.

Source link