CIO Influence
CIO Influence News Security

Authomize Uncovers Clear Text Password Risk Exposing Okta Customers to Exploitation

Authomize Uncovers Clear Text Password Risk Exposing Okta Customers to Exploitation

Authomize, the first Cloud Identity and Access Security platform, announced its discovery of significant inherent security risks in Okta, one of the leading Identity Provider (IdP) services.

Authomizeโ€™s Security Research lab has uncovered that with a very limited level of privilege and practically no difficulty, a malicious actor can remotely:

  • Extract all passwords in clear text
  • Impersonate other users in downstream applications and hubs
  • Alter their appearance in logs to hide their activity

All while gaining long-term persistence that will allow them to maintain access within the target.

Authomizeโ€™s CTO and Co-founderย Gal Diskinย describes the highly risky security exposures as flawed yet intentional designs that open the door to exploitation, and not simply a coding mistake. In their response to Authomizeโ€™s responsible disclosure, Okta has stated that they do not believe these security issues to be vulnerabilities, but functions working according to their intended design and expected inherent risks.

โ€œOur team discovered these risky designs during the course of our research into Identity Providers,โ€ says Diskin. โ€œFollowing the news of the Okta breach earlier this year, we focused our efforts on understanding what sorts of actions a malicious actor could do if they achieved even a minimal level of access within the Okta platform. As we laid out in ourย technicalย write upย of these major operational risks, we were very surprised to find that Oktaโ€™s architecture for password synching creates a situation where an actor can simply pull out passwords in clear text, even over unencrypted channels (HTTP), and including the passwords of more senior admins.โ€

Latest ITechnology News: SAS Recognizes Global Partners Driving Innovation in the Cloud

In detailing the security exposures, Diskin explains that all that is needed for extracting the clear text passwords is for an actor to gain app admin privileges. Given the constantly expanding number of users within organizations of all sizes, especially in enterprises, he says that the probability of an app admin being compromised is statistically quite high with the Verizon Data Breach Investigations Report for 2022 finding that 82% of beaches involved human elements like stolen credentials and phishing. More concerningly, these app admins are generally not treated as privileged identities. Diskin noted that this functionality serves a real legitimate purpose for Okta customers, but the exchange of passwords using clear text transmission over unencrypted channels goes against the accepted best practices in the security industry.

Oktaโ€™s Hub and Spoke architecture also leaves organizations open to exploitation. Spokes are meant to allow for segmentation between sub-groups or departments or even sub-contractors. However Diskin and his team discovered that a spoke admin, of which there are many within an organization, can easily impersonate another spoke admin within the hub if necessary controls, which are available from Okta but not explained or activated by default, are not implemented.

โ€œUsing this functionality an attacker, either internal or external, can impersonate other admins and achieve persistence within the hub and downstream apps that puts the whole organization at critical risk. It is important to note that the required security controls exist within Okta, just that rather than being secure by default and well highlighted in documentation, those are actually only mentioned in passing and not configured securely by default,โ€ explains Diskin, adding that anyone, admin or not, can alter the way they appear in the logs to cover up their activity while impersonating another user or performing other unsanctioned activity.

โ€œWhile some of these risks are Okta specific and definitely require some addressing I think that there is a more fundamental issue here which is that some attacks are inherent to the way modern Identity Providers, Enterprise SSO, and IAM tools work. The key here is that just like with CSPs, the Identity Providers need to enable third party security monitoring by providing relevant APIs and audit logs,โ€ says Diskin.

Latest ITechnology News: Nokia Extends Strategic Partnership with Wipro to Drive Digital Transformation and Efficiencies

โ€œThere are immediate steps that both Okta and organizations can take to mitigate the risks that we have uncovered,โ€ says Diskin. โ€œThe first step is for Okta to block the ability to export the master password for Okta user accounts, allowing instead only for the export of alternate passwords that is a much more secure option. Next is discontinuing the use of duplicate identities in their Hub and Spoke architecture, or at least making that the default configuration, and saving only the unique user identifier and not the mutable name in logs.โ€

โ€œFor their part, organizations need to apply monitoring to Okta to look for changes in configurations and the actual actions performed by users,โ€ says Diskin, noting that it is essential to focus especially on the admins if they hope to catch a malicious actor in time to prevent damage or compromise.

โ€œWe are working closely with our customers to ensure that they are protected from being exploited,โ€ says Diskin, explaining that, โ€œOur research highlights the criticality for organizations to implement an independent security layer around their Identity and Access Management (IAM) tools like Okta, monitoring, validating, and detecting risks within these systems to ensure that the infrastructure systems that they depend on for managing their identities and access are not themselves used as as the route of exploitation by malicious actors.โ€

In response to Authomizeโ€™s responsible disclosure, Okta has confirmed that all of these risks are intentional design decisions, and does not consider them as vulnerabilities. However, they say that their product team will work to address the password leakage issue and will look into the other issues outlined in Authomizeโ€™s research that may impact their customers.

Latest ITechnology News: SafeGuard Cyber Delivers Context-Aware Response with Microsoft Azure AD and Okta

[To share your insights with us, please write toย sghosh@martechseries.com]

Related posts

Zendesk Launches New Customer Sentiment and Intent Functionality Powered by Machine Learning

CIO Influence News Desk

Insight Offers Managed Security for Compliance Solution to Manage Microsoft 365 Security Upgrade

CIO Influence News Desk

SM Caen to Leverage Stats Perform Sports AI Solutions for a Competitive Edge

CIO Influence News Desk