checkLoop 1
12/2/2019
03:30 PM
50%
50%

Microsoft Fixes Flaw Threatening Azure Accounts

Researchers detail a bug they found in some of Microsoft's OAuth 2.0 applications.

Researchers from CyberArk today outlined a vulnerability they discovered this fall in some Microsoft OAuth 2.0 applications that could allow an attacker to hijack Azure accounts. Microsoft fixed the flaw late last month.

The weaknesses lie in OAuth settings in Microsoft's Portfolios, O365 Secure Score, and Microsoft Service Trust applications, and could be abused by an attacker to grab admin accounts and basically "own" Azure accounts. OAuth is a popular authorization protocol that allows users to share information about their accounts among third-party applications and websites.

"The OAuth applications trust domains and sub-domains are not registered by Microsoft, so they can be registered by anyone (including an attacker). These apps are approved by default and are allowed to ask for 'access_token,'" CyberArk said in a blog post about the vuln. "The combination of these two factors makes it possible to produce an action with the user's permissions – including gaining access to Azure resources, AD resources and more."

Read more here.

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "A Cause You Care About Needs Your Cybersecurity Help."

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Email This  | 
Print  | 
RSS
More Insights
Copyright © 2019 UBM Electronics, A UBM company, All rights reserved. Privacy Policy | Terms of Service