Cyber News

Microsoft Azure MFA Vulnerability Allows Unauthorized User Account Access

A critical vulnerability in Microsoft’s Multi-Factor Authentication (MFA) implementation has been uncovered by Oasis Security’s research team, potentially exposing over 400 million Office 365 accounts to unauthorized access.

The flaw, dubbed “AuthQuake,” allowed attackers to bypass MFA protections and gain access to user accounts, including Outlook emails, OneDrive files, Teams chats, and Azure Cloud resources.

Leveraging 2024 MITRE ATT&CK Results for SME & MSP Cybersecurity Leaders – Attend Free Webinar

The AuthQuake flaw stemmed from two key issues in Microsoft’s MFA system:

  1. Lack of Rate Limiting: Attackers could rapidly create new sessions and attempt multiple code guesses simultaneously, quickly exhausting all possible 6-digit code combinations.
  2. Extended Code Validity: TOTP codes remained valid for approximately 3 minutes, significantly longer than the standard 30 seconds, increasing the window of opportunity for attackers.

These vulnerabilities allowed malicious actors to potentially breach MFA defenses within 70 minutes, achieving a success rate exceeding 50%. Alarmingly, the exploit required no user interaction and generated no alerts, leaving account holders oblivious to the ongoing attack.

Attack Method

AuthQuake Attack Method

The bypass technique exploited weaknesses in the time-based one-time password (TOTP) system:

  1. Attackers initiated multiple sessions using the same parameters.
  2. By rapidly creating new sessions and enumerating codes, they could attempt combinations at a high rate.
  3. The extended 3-minute validity window for codes increased the chances of a successful guess.

Upon notification by Oasis Security, Microsoft took swift action:

  • June 24, 2024: Microsoft acknowledged the issue.
  • July 4, 2024: A temporary fix was deployed.
  • October 9, 2024: A permanent solution was implemented.

The permanent fix involved introducing stricter rate-limiting mechanisms that activate after a number of failed attempts, lasting for approximately half a day.

While this specific vulnerability has been addressed, the incident highlights the importance of robust MFA implementations. Security experts recommend:

  1. Implement Stricter Rate Limiting: Enforce limits on failed authentication attempts to prevent brute-force attacks.
  2. Monitor Failed MFA Attempts: Set up alerts for repeated second-factor authentication failures to detect suspicious activity.
  3. Regular Security Audits: Continuously review and update security configurations to identify and resolve vulnerabilities.
  4. User Education: Conduct regular training to help employees understand the importance of MFA and how to use it effectively.

Despite this setback, MFA remains a critical security measure. Organizations are advised to continue using MFA, preferably with authenticator apps or stronger passwordless methods while staying vigilant against potential vulnerabilities.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

SecAI Debuts at RSA 2025, Redefining Threat Investigation with AI

By fusing agentic AI and contextual threat intelligence, SecAI transforms investigation from a bottleneck into…

43 minutes ago

How Healthcare Providers Investigate And Prevent Cyber Attacks: Real-world Examples

According to IBM Security annual research, "Cost of a Data Breach Report 2024", an average…

2 hours ago

NVIDIA Riva Vulnerabilities Exposes Enable Authorized Access to Cloud Environments

A critical security flaw in NVIDIA's Riva framework, an AI-powered speech and translation service, has…

2 hours ago

CISA Adds Broadcom Brocade Fabric OS Vulnerability to Known Exploited Vulnerabilities Catalog

CISA officially added a significant security flaw affecting Broadcom’s Brocade Fabric OS to its authoritative…

3 hours ago

AirPlay Zero-Click RCE Vulnerability Enables Remote Device Takeover via Wi-Fi

A critical vulnerability in Apple’s AirPlay protocol, dubbed AirBorne, has exposed over 2.35 billion active…

3 hours ago

Google Chrome Vulnerability Let Attackers Escape Payload from Sandbox – Technical Details Disclosed

A critical vulnerability in Google Chrome has recently been discovered that allows malicious actors to…

3 hours ago