This vulnerability of Microsoft Entra ID could be catastrophic

As businesses around The world has moved its digital infrastructure over the last decade of self -hosted servers in the cloud, they have benefited from the standardized, built -in security functions of major cloud suppliers such as Microsoft. But with so much riding of these systems, there can be potentially catastrophic consequences on a huge scale if something goes wrong. Example: Security researcher Dirk-Jan Molem has recently encountered a pair of vulnerabilities in the identity platform and management of Microsoft Azure access that could be used for potentially cataclysmic absorption of all Azure customer accounts.

Known as Entra ID, the system stores Azure Cloud’s user identities, access control controls, applications and subscription management tools. Mollema has studied Entra ID’s security in depth and has published numerous studies on the weaknesses in the system, which was previously known as Azure Active Directory. But as he was preparing to present the Black Hat Security Conference in Las Vegas in July, the mole found two vulnerabilities that he realized that he could be used to obtain global privileges of the administrator – essentially God regime – and compromises every directory of ID, or what is known as a « tenant ». The prayer says that this would exhibit almost every tenant of Entra ID in the world other than, perhaps, government cloud infrastructure.

« I was just staring at my screen. I was like, » No, it shouldn’t really happen, « says the molem, which runs the Dutch outsider cybersecurity company and specializes in cloud security. « It was pretty bad. As much as it was, I would say. »

« From my own tenants – a test test tests or even a trial tenant – you can ask for these tokens and you can introduce yourself for anyone else in some other tenant, » the mole adds. « This means that you can change other people’s configuration, create new and administrator users in this tenant, and do everything you would like. »

Given the seriousness of vulnerability, the molem revealed its discoveries to the Microsoft Security Center on July 14, the same day he found the disadvantages. Microsoft began investigating findings that day and issued a worldwide amendment on July 17th. The company confirmed to Mollema that the problem was eliminated until July 23 and implements additional measures in August. Microsoft released a CVE about the vulnerability on September 4.

« We quickly mitigated the recently identified problem and accelerated the recovery work to bring out this use of the protocol protocol as part of our safe initiative for the future, » said Tom Galagire, Vice President of the Microsoft Security Center. « We have implemented the code change in the logic of vulnerable validation, tested the amendment and applied it through our cloud ecosystem. »

Gallagher says Microsoft has found « no evidence of abuse » of vulnerability during his investigation.

Both vulnerabilities refer to the inherited systems that still function within Entra ID. The first includes the Azure Authentication token Mollema, discovered, known as the actor markers, which are issued by an unclear Azure mechanism called « Access Control Control Service ». Actors’ markers have some special system properties that the mole has realized that they can be useful for an attacker when combined with another vulnerability. Another mistake was a major drawback to the historic Active Directory Active Directory programming interface known as « graphics », which is used to facilitate access to data stored in Microsoft 365. Microsoft is in the process of retirement and the Azure Active GRAPH GRAPH designed for Entra ID. The disadvantage was to fail by Azure Ad Graph to correctly confirm which Azure tenant requests access that can be manipulated so that API accepts an actor from another tenant who should be rejected.

(Tagstotranslate) vulnerabilities

Security,Security / Cyberattacks and Hacks,Security / Security News,God Mode

#vulnerability #Microsoft #Entra #catastrophic

Laisser un commentaire

Votre adresse e-mail ne sera pas publiée. Les champs obligatoires sont indiqués avec *