• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Microsoft MFA AuthQuake Flaw Enabled Unlimited Brute-Force Attempts Without Alerts

You are here: Home / Cyber Security News / Microsoft MFA AuthQuake Flaw Enabled Unlimited Brute-Force Attempts Without Alerts

Cybersecurity researchers have flagged a “critical” security vulnerability in Microsoft’s multi-factor authentication (MFA) implementation that allows an attacker to trivially sidestep the protection and gain unauthorized access to a victim’s account.

“The bypass was simple: it took around an hour to execute, required no user interaction and did not generate any notification or provide the account holder with any indication of trouble,” Oasis Security researchers Elad Luz and Tal Hason said in a report shared with The Hacker News.

Following responsible disclosure, the issue – codenamed AuthQuake – was addressed by Microsoft in October 2024.

While the Windows maker supports various ways to authenticate users via MFA, one method involves entering a six-digit code from an authenticator app after supplying the credentials. Up to 10 consequent failed attempts are permitted for a single session.

The vulnerability identified by Oasis, at its core, concerns a lack of rate limit and an extended time interval when providing and validating these one-time codes, thereby allowing a malicious actor to rapidly spawn new sessions and enumerate all possible permutations of the code (i.e., one million) without even alerting the victim about the failed login attempts.

It’s worth noting at this point that such codes are time-based, also referred to as time-based one-time passwords (TOTPs) wherein they are generated using the current time as a source of randomness. What’s more, the codes remain active only for a period of about 30 seconds, after which they are rotated.

“However, due to potential time differences and delays between the validator and the user, the validator is encouraged to accept a larger time window for the code,” Oasis pointed out. “In short, this means that a single TOTP code may be valid for more than 30 seconds.”

In the case of Microsoft, the New York-based company found the code to be valid for as long as 3 minutes, thus opening the door to a scenario where an attacker could take advantage of the extended time window to initiate more brute-force attempts simultaneously to crack the six-digit code.

“Introducing rate-limits and making sure they are properly implemented is crucial,” the researchers said. “Rate limits might not be enough, in addition – consequent failed attempts should trigger an account lock.”

Microsoft has since enforced a stricter rate limit that gets triggered after a number of failed attempts. Oasis also said the new limit lasts around half a day.

“The recent discovery of the AuthQuake vulnerability in Microsoft’s Multi-Factor Authentication (MFA) serves as a reminder that security isn’t just about deploying MFA – it must also be configured properly,” James Scobey, chief information security officer at Keeper Security, said in a statement.

“While MFA is undoubtedly a powerful defense, its effectiveness depends on key settings, such as rate limiting to thwart brute-force attempts and user notifications for failed login attempts. These features are not optional; they are critical for enhancing visibility, allowing users to spot suspicious activity early and respond swiftly.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « ZLoader Malware Returns With DNS Tunneling to Stealthily Mask C2 Comms
Next Post: New Malware Technique Could Exploit Windows UI Framework to Evade EDR Tools »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Samsung Patches CVE-2025-4632 Used to Deploy Mirai Botnet via MagicINFO 9 Exploit
  • BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic Trojan
  • Xinbi Telegram Market Tied to $8.4B in Crypto Crime, Romance Scams, North Korea Laundering
  • CTM360 Identifies Surge in Phishing Attacks Targeting Meta Business Users
  • Earth Ammit Breached Drone Supply Chains via ERP in VENOM, TIDRONE Campaigns

Copyright © 2025 · AllTech.News, All Rights Reserved.