Podcast
Root Causes 214: New DUO MFA Flaw Explained


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
April 5, 2022
A recent FBI warning cautions organizations about exploits based on misconfigured DUO MFA, which exploits weaknesses in Active Directory to provision credentials on DUO for malicious parties. This is an unusual story in several ways, including the fact that the exploit is based on a configuration error and that it's specific to a single, popular SaaS offering. Our hosts explain this exploit and why it is noteworthy.
Podcast Transcript
Lightly edited for flow and brevity.
This is about the mistakes that can be made so easily and so commonly that the FBI has to issue a warning to enterprises about it. In other words, looking through the article here, there are some very good points. So, when you're configuring and you're reviewing your MFA setup, you really need to set up your configuration policies to protect against a fail open and reenrollment scenarios. In other words, you as an enterprise can very easily choose, great, I'm using MFA. I feel warm and fuzzy. I feel safe. It seems to be a real pain in the neck for people who happen to lose their password or maybe lose their phone, so reenrollment on a new device, let's just make that super dead easy and oh, what the heck, we're using MFA, so, we're all safe? Well, if you've configured it to be so easy to reenroll to a new device, and you're not fully disabling certain identities once they are disabled, then goodness. In fact, part of what the article said here is one of the reasons why people had become disabled was because they had not used their DUO account for a long time. And so therefore, part of the policy that was set was your length of inactivity had bumped you off, but then the bad guys were able to obtain your password somehow. Could be by any means. In the article, they were saying brute force guessing, but you can just imagine that something like keylogging would be just as easy, if not more so.
I would say, Tim, the centralized place that needs to be locked down further here is at the Active Directory level. It's not at the client level. It is at the Active Directory level and the choices you make about how that kind of, it's the same kind of issues you have to think through when you're first provisioning your users. What's the secure way of doing that? Well, I guess in this case, part of the issue is people have not fully thought through well, what is the reprovisioning process? Not just the initial provisioning process. What's the reprovisioning process? And that seems to be the configuration problem down at the Active Directory level that is problematic here. I mean, I guarantee the vendor is trying to say, look, you can set it up any way you like, we will play ball with you because every enterprise is going to have a different appetite for risk and a different way that they want to set up their help desk. And so, it's not really DUO who is going to dictate that to an enterprise. Unfortunately, I can see how enterprises, and especially Active Directory teams, kind of opt for the easy breezy method, because it saves them calls to the help desk. And unfortunately, it makes life easy for the bad guys.
It was interesting. Interesting story on a few angles. So, I think it was good that you brought this up today and we talked about this.
So the best way to think about what we're talking about in this podcast is, yes, you can do Active Directory correctly. Yes, you can. It's just, it's hard. And you need to learn a lot of things. You can absolutely implement DUO correctly. It's just, hey, follow what the FBI is telling you here, because they're giving you some good advice, saying you gotta lock down that config. And remember, folks, if the underlying credential is just a username and password, you really got to be careful.

