
Microsoft Azure has been making huge headlines in the past few weeks. However, the cloud computing service also has some serious cybersecurity issues. The latest issue is about a permission flaw in the Microsoft Azure Active Directory service.
According to Threadpost, which got details of the story, the latest security flaw could allow anyone to gain unauthorized access to company's internal network. Most of the affected users include those companies that have Office 365 deployment running on Microsoft Active Directory (AD) Domain Services. Office 365 customers used the Microsoft Azure Active Directory service to connect between on-premise and hybrid deployments.
The Azure AD permission flaw was first identified by the cybersecurity firm Preempt, which made a thorough analysis of the cloud-based service. The security firm said that the permission flaw on the Azure Active Directory Connect can allow rogue IT admins to gain full domain control. The IT security firm made a recent blog post, providing details about the permission flaw. The Preempt researchers said that a rogue IT admins would likely target the MS Online Powershell Module, a part of Azure Active Directory. Researchers believe that this service will likely target because accounts here are often less monitored compared to full domain admins.
In addition to the technical write-up about the vulnerability, the security firm also made a YouTube video, detailing more about the Azure AD vulnerability. Preempt CTO Roman Blachman said that the latest flaw could allow trusted users with limited privileges within a domain to gain unauthorized access and escalate privileges. Blachman also discussed the possible technique that will likely be used by rogue admins.
Microsoft has already acknowledged the permission flaw but has not released any patch to fix the vulnerability issue. Instead, the software giant released a Microsoft Security Advisory 4056318 and a Powershell script that will help affected customers modify the properties of their AD DS synchronization account (MSOL).
The software company also announced that the future versions of the affected web-based productivity software would not be impacted by this permission flaw on the Microsoft Azure AD Connect.