Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

8/14/2018
01:45 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Microsoft ADFS Vulnerability Lets Attackers Bypass MFA

The flaw lets an attacker use the same second factor to bypass multifactor authentication for any account on the same ADFS service.

A newly discovered vulnerability in Microsoft's Active Directory Federation Services (ADFS) lets threat actors bypass multifactor authentication (MFA) as long as they have the username and password for another person on the same ADFS service. Microsoft patched the flaw today.

This means the second factor for one account could be used for all other accounts in an organization. Andrew Lee, the security engineer for Okta Research and Exploitation (REX) who discovered the bug, equates it to "turning a room key into a master key for every door in the building — but in this building, each door has a second lock that accepts a passcode."

Many businesses use ADFS as a gatekeeper to manage identities and resources. ADFS Agents, extensions of the system, enable integration with MFA providers including Microsoft and third-party vendors such as Okta, Duo, Gemalto, RSA, and SecureAuth. The ADFS weakness discovered here affects all tested MFA solutions using the official integration API, Lee reports.

"If you can have one MFA factor for any user, you can have it for all users," says Matias Brutti, director of research at Okta REX. Any MFA provider that integrates is vulnerable because the vulnerability (CVE-2018-8340) exists in ADFS and not within the MFA services.

How it works: An attacker has a username and password for Employee 1 (target), as well as the username, password, and second factor for Employee 2. Both employees are on the same Active Directory service. Employee 2 could be an insider and easily receive a second factor because they have a legitimate account, or someone who has not activated a second factor. In the latter case, an attacker could simply enroll a second factor on their own device.

Once they have credentials for both employees, an attacker can enter those on the AD login page in separate browsers. They can then take the second factor for Employee 2 and enter it when prompted for MFA to access Employee 1's account, effectively bypassing MFA.

"You basically move MFA out of the equation because you can use your own," says Brutti.

This type of attack is easier for internal actors who already have credentials and can easily obtain a second factor; all they need is the username and passwords of another person on the ADFS service they want to compromise. External attackers need to start from scratch, but even still, it's not difficult to get everything they need to launch this type of threat, Brutti adds.

"If you no longer require MFA and you only need one [factor], the complexity of the insider attack gets reduced significantly," Brutti says. However, with the number of phishing attacks regularly targeting organizations, it's not hard to find employee credentials online. If rogue actors wanted to buy a username and password within a target organization, they could.

This attack has not been seen in the wild among Okta or its customers, though Brutti notes its researchers haven't been able to evaluate processes outside its own organization.

Recommendations to Ramp Up MFA Security
Companies have come to rely on MFA to protect their employees from phishing attacks, says Brutti, and many people have been conditioned to assume MFA is "some sort of silver bullet."

"The reality is that's not the case. … MFA is just like any other technology," he explains. "It works great, but it's not a silver bullet. It's susceptible to the same type of vulnerability any other technology is." MFA methods such as hardware tokens and push notifications are more secure than SMS, but even those are not immune to vulnerabilities.

That said, Brutti advises using MFA because it does increase the difficulty of an effective cyberattack. Businesses simply have to take the right precautions and educate their employees on how to properly use MFA, how to spot phishing attacks, and how to create stronger passwords.

Brutti anticipates we'll continue seeing more conversation around MFA as adoption increases and researchers continue to find holes in the infrastructure.

More Patches to Prioritize
Microsoft today issued patches for several serious vulnerabilities, two of which are publicly known and under active attack. Sixty total patches addressed vulnerabilities in Internet Explorer, Edge, Windows components, Microsoft Office and Office Services, ChakraCore, .NET Framework, and SQL Server. Twenty are deemed Critical, 38 are Important, one is Moderate, and one is Low severity.

One of the vulnerabilities under active attack is CVE-2018-8373, an Internet Explorer Memory Corruption Vulnerability that is similar in nature to CVE-2018-8174, which was also under active attack when it was patched in May. The other is CVE-2018-8414, a Windows Shell Remote Code Execution Vulnerability which involves the Windows Shell and invalid file paths, Trend Micro researchers explain.

Related Content:

Learn from the industry's most knowledgeable CISOs and IT security experts in a setting that is conducive to interaction and conversation. Early bird rate ends August 31. Click for more info

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
tdsan
50%
50%
tdsan,
User Rank: Ninja
8/16/2018 | 2:22:39 PM
Very good article
I enjoyed reading the post, it seems that ADFS has some issues but it if someone with the right influence, money, and power wanted to make a go at getting a person's credentials, they could.

So this goes beyond the ADFS Vulnerability, this says as humans we are ultimately flawed, where if pushed hard enough with the right level of influence, anyone could be susceptible to being compromised.

So to be honest, all of this security talk is nothing more than a facade, so basically, anyone can be compromised. So then the answer to our security concerns is not the technology, it is the people.

T
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Unreasonable Security Best Practices vs. Good Risk Management
Jack Freund, Director, Risk Science at RiskLens,  11/13/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19012
PUBLISHED: 2019-11-17
An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or ...
CVE-2019-19022
PUBLISHED: 2019-11-17
iTerm2 through 3.3.6 has potentially insufficient documentation about the presence of search history in com.googlecode.iterm2.plist, which might allow remote attackers to obtain sensitive information, as demonstrated by searching for the NoSyncSearchHistory string in .plist files within public Git r...
CVE-2019-19035
PUBLISHED: 2019-11-17
jhead 3.03 is affected by: heap-based buffer over-read. The impact is: Denial of service. The component is: ReadJpegSections and process_SOFn in jpgfile.c. The attack vector is: Open a specially crafted JPEG file.
CVE-2019-19011
PUBLISHED: 2019-11-17
MiniUPnP ngiflib 0.4 has a NULL pointer dereference in GifIndexToTrueColor in ngiflib.c via a file that lacks a palette.
CVE-2019-19010
PUBLISHED: 2019-11-16
Eval injection in the Math plugin of Limnoria (before 2019.11.09) and Supybot (through 2018-05-09) allows remote unprivileged attackers to disclose information or possibly have unspecified other impact via the calc and icalc IRC commands.