UPDATED 21:59 EDT / DECEMBER 11 2018

SECURITY

Microsoft vulnerability could have exposed the accounts of 400M Office 365 users

A misconfigured subdomain owned by Microsoft Corp. could have exposed the accounts of as many 400 million Office 365 users to having their accounts taken over, a security researcher has revealed.

The mistake, spotted and reported Tuesday by Indian security researcher and Microsoft bug hunter Sahad Nk, is primarily related to a failure by Microsoft to secure the subdomain success.office.com properly.

In a disturbing list of actions, Nk was able to issue a new CNAME record for the subdomain and divert traffic passing through it to an external server, in this case, his Microsoft Azure account. In doing so, he could capture any data being sent through the subdomain.

How he did so was perhaps even worse because he could use his own Microsoft account, using two-factor authentication, to take over the subdomain, exposing a flaw in Microsoft’s OAuth authentication checks as well.

“Nk also found that Microsoft Office, Store and Sway apps could be tricked into sending their authenticated login tokens to his newly controlled domain after a user logs in through Microsoft’s Live login system,” TechCrunch reported.

The only saving grace in this comedy of errors was that Nk immediately reported the issues to Microsoft, which fixed them. Microsoft confirmed the report, saying that it mitigated the case in November and paid Nk a bug bounty for his efforts.

The report came on the same day Microsoft released its monthly Patch Tuesday security release. It included patches to address nearly 40 vulnerabilities, several of which are rated critical, with the majority of vulnerabilities rated as important.

“One of the most important flaws is a Windows Kernel Elevation of Privilege vulnerability (CVE-2018-8611), which has been exploited in the wild by attackers,” Satnam Narang, senior research engineer at Tenable Inc., told SiliconANGLE. “While this vulnerability requires an attacker to have an established presence on the vulnerable system, security teams should prioritize it in their patching cycles.”

Photo: Maxpixel

A message from John Furrier, co-founder of SiliconANGLE:

Your vote of support is important to us and it helps us keep the content FREE.

One click below supports our mission to provide free, deep, and relevant content.  

Join our community on YouTube

Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.

“TheCUBE is an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate the content you create as well” – Andy Jassy

THANK YOU