<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Adversaries Can “Log In with Microsoft” through the nOAuth Azure Active Directory Vulnerability in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Adversaries-Can-Log-In-with-Microsoft-through-the-nOAuth-Azure/m-p/61021#M4013</link>
    <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;An interesting piece on the Microsoft nOAuth issues:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;On June 20, 2023, Descope &lt;/SPAN&gt;&lt;A href="https://www.descope.com/blog/post/noauth" target="_blank"&gt;&lt;SPAN&gt;published research &lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;detailing how a combination of a flaw in Azure Active Directory and poorly integrated third-party applications — dubbed “nOAuth” — could lead to full account takeover. nOAuth is the latest in a large number of &lt;/SPAN&gt;&lt;A href="https://www.cvedetails.com/top-50-vendors.php" target="_blank"&gt;&lt;SPAN&gt;vulnerabilities&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; and architectural weaknesses in Microsoft software and systems like Active Directory that can be exploited and put organizations at risk.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;While Microsoft has &lt;/SPAN&gt;&lt;A href="https://msrc.microsoft.com/blog/2023/06/potential-risk-of-privilege-escalation-in-azure-ad-applications/" target="_blank"&gt;&lt;SPAN&gt;responded&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; to the vulnerability, until developers make code changes in their applications, the proposed mitigation relies on organizations having strong identity protection capabilities to protect privileged accounts from misuse by rogue administrators.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.crowdstrike.com/blog/noauth-microsoft-azure-ad-vulnerability/" target="_blank"&gt;https://www.crowdstrike.com/blog/noauth-microsoft-azure-ad-vulnerability/&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Caute_Cautim&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 09 Oct 2023 10:39:01 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2023-10-09T10:39:01Z</dc:date>
    <item>
      <title>Adversaries Can “Log In with Microsoft” through the nOAuth Azure Active Directory Vulnerability</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Adversaries-Can-Log-In-with-Microsoft-through-the-nOAuth-Azure/m-p/61021#M4013</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;An interesting piece on the Microsoft nOAuth issues:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;On June 20, 2023, Descope &lt;/SPAN&gt;&lt;A href="https://www.descope.com/blog/post/noauth" target="_blank"&gt;&lt;SPAN&gt;published research &lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;detailing how a combination of a flaw in Azure Active Directory and poorly integrated third-party applications — dubbed “nOAuth” — could lead to full account takeover. nOAuth is the latest in a large number of &lt;/SPAN&gt;&lt;A href="https://www.cvedetails.com/top-50-vendors.php" target="_blank"&gt;&lt;SPAN&gt;vulnerabilities&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; and architectural weaknesses in Microsoft software and systems like Active Directory that can be exploited and put organizations at risk.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;While Microsoft has &lt;/SPAN&gt;&lt;A href="https://msrc.microsoft.com/blog/2023/06/potential-risk-of-privilege-escalation-in-azure-ad-applications/" target="_blank"&gt;&lt;SPAN&gt;responded&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; to the vulnerability, until developers make code changes in their applications, the proposed mitigation relies on organizations having strong identity protection capabilities to protect privileged accounts from misuse by rogue administrators.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.crowdstrike.com/blog/noauth-microsoft-azure-ad-vulnerability/" target="_blank"&gt;https://www.crowdstrike.com/blog/noauth-microsoft-azure-ad-vulnerability/&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Caute_Cautim&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 10:39:01 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Adversaries-Can-Log-In-with-Microsoft-through-the-nOAuth-Azure/m-p/61021#M4013</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-10-09T10:39:01Z</dc:date>
    </item>
  </channel>
</rss>

