Published Mon, Apr 29th, 2024
Platforms
A vulnerability in Microsoft Graph allowed attackers to conduct password-spray attacks without detection. The issue involved switching the 'common' authentication endpoint with that of an unrelated tenant, thereby avoiding the appearance of logon attempts in the victim's logs. This technique could allow attackers to validate user credentials through verbose error messages, but actual successful logons using these credentials would still be recorded in the victims' logs (regardless of endpoint).
Microsoft Graph
None required
No tracked CVEs
Contributed by https://github.com/mer-b
Entry Status
Finalized
Disclosure Date
-
Exploitability Period
June 2023 - March 2024
Known ITW Exploitation
-
Detection Methods
None
Piercing Index Rating
-
Discovered by
Nyx Geek, TrustedSec