Microsoft MFA AuthQuake Flaw Enabled Unlimited Brute-Force Attempts Without Alerts

Microsoft MFA AuthQuake Flaw Enabled Unlimited Brute-Force Attempts Without Alerts

December 11, 2024 at 09:42AM

A critical vulnerability in Microsoft’s multi-factor authentication (MFA) was identified, allowing attackers to bypass security easily without user notice. Labeled AuthQuake, the flaw stemmed from inadequate rate limits and extended code validity. Microsoft addressed the issue in October 2024, tightening security measures to enhance MFA effectiveness.

**Meeting Takeaways: Dec 11, 2024 – Vulnerability / Authentication**

1. **Critical Vulnerability in MFA**:
– A significant security vulnerability, dubbed “AuthQuake,” was discovered in Microsoft’s multi-factor authentication (MFA) methods, allowing unauthorized access to user accounts without any alerts or notifications.

2. **Method of Attack**:
– Attackers could bypass MFA protections with around an hour of effort, utilizing a lack of rate limiting and extended time for validating time-based one-time passwords (TOTPs).
– This loophole allowed for rapid enumeration of possible six-digit codes (up to one million attempts), without alerting the target.

3. **Time Validation Issues**:
– TOTPs, which are usually valid for about 30 seconds, could be accepted for as long as 3 minutes in Microsoft’s system due to potential time discrepancies.
– This extended validation period facilitated brute-force attacks.

4. **Remedial Actions by Microsoft**:
– Microsoft addressed the vulnerability in October 2024 by enforcing stricter rate limits on failed attempts, with penalties resulting in an account lock after multiple failures.

5. **Importance of Proper Configuration**:
– Cybersecurity experts emphasize that merely implementing MFA is insufficient; proper configuration—including enforcing rate limits and user notifications for logins attempts—is crucial to enhance security and user awareness.

6. **Expert Insight**:
– James Scobey, CISO at Keeper Security, highlighted the necessity of key settings for MFA effectiveness and the importance of user notifications to detect unusual activities early.

7. **Recommendation for Organizations**:
– Organizations using MFA should review their configurations to ensure robust security measures are in place, particularly focusing on rate limits and notification systems.

This summary captures the key points discussed in the meeting regarding the vulnerabilities in Microsoft’s MFA system and the necessary actions moving forward.

Full Article