FB pixel

Microsoft Entra ID authentication security flaw threatens hybrid environments

Categories Access Control  |  Biometrics News
Microsoft Entra ID authentication security flaw threatens hybrid environments
 

A newly discovered vulnerability in Microsoft’s Entra ID (formerly Azure Active Directory) has exposed a critical threat to hybrid cloud environments. This flaw, identified by researchers from Cymulate, allows attackers to bypass authentication mechanisms in Pass-Through Authentication (PTA) systems used by organizations with hybrid identity infrastructures.

The vulnerability exploits the way PTA agents handle authentication requests across multiple on-premises Entra ID domains, Dark Reading reports. Normally, when a user tries to sign in, the PTA agent validates the credentials against the on-premises Entra. However, researchers found that if a login request is processed by an agent from a different domain, it results in authentication failure because the server doesn’t recognize the user. By injecting malicious code into the PTA agent, an attacker can manipulate this process to successfully validate credentials, effectively bypassing authentication and gaining unauthorized access to user accounts across different domains.

Selfie biometrics for authentication to Entra ID reached general availability just last week.

This vulnerability can be exploited by anyone with admin access to a PTA server, allowing them to log in as any user synced with Entra ID without needing their actual credentials.

Cymulate researchers disclosed in their blog that they initially reported the vulnerability to the Microsoft Security Response Center (MSRC) on July 5. Microsoft responded on July 19, downplaying the severity of the issue as “moderate” and stating that it doesn’t pose an immediate threat. Despite acknowledging the flaw, Microsoft informed Cymulate that it does not plan to issue a CVE (Common Vulnerabilities and Exposures) for this problem. However, it promises that a fix is planned and is already on their to-do list, though no estimated timeline for the resolution has been provided​.

The company has recommended treating PTA servers as Tier-0 components and enforcing strict security measures while they work on a fix. Cymulate has also suggested implementing domain-aware routing and stricter separation between domains to mitigate this risk.

Related Posts

Article Topics

 |   |   |   | 

Latest Biometrics News

 

Stop treating identity as a compliance step. It’s infrastructure now

By Harry Varatharasan, Chief Product Officer, ComplyCube The UK governmentʼs digital identity consultation is closing, and for most commentators, this…

 

If you build it, they will leave: experts warn UK gov’t on digital ID approach

The UK Cabinet Office’s consultation on digital identity closed on Tuesday, Digital systems built by governments tend to decline over…

 

Shufti biometric PAD clears iBeta Level 3 with 0 errors across iOS, Android

London-based global identity verification and fraud prevention provider Shufti has passed a Level 3 evaluation of its biometric Presentation Attack…

 

OpenID draft spec for extended identity claims assurance up for approval

Voting is open for approval of a draft specification to extend OpenID Connect to cover new features for requesting and…

 

EES troubles ignite speculation of further suspensions

Crowds, chaos and cranky travelers: The EU’s biometric border management scheme, the Entry-Exit System (EES), continues to fill headlines as…

 

UK Home Office eyes suppliers for SCBP biometrics platform

The Home Office is hosting a preliminary market engagement event to engage with potential suppliers for two not-yet-guaranteed future procurements…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis and Buyer's Guides

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events