Vulnerability in Azure AD Connect Could Allow Elevation of Privilege

Password writeback is a component of Azure AD Connect. It allows users to configure Azure AD to write passwords back to their on-premises Active Directory. It provides a convenient cloud-based way for users to reset their on-premises passwords wherever they are. For information about password writeback, refer to Password writeback overview.

To enable Password writeback, Azure AD Connect must be granted Reset Password permission over the on-premises AD user accounts. When setting up the permission, an on-premises AD Administrator may have inadvertently granted Azure AD Connect with Reset Password permission over on-premises AD privileged accounts (including Enterprise and Domain Administrator accounts). For information about AD privileged user accounts, refer to Protected Accounts and Groups in Active Directory.

This configuration is not recommended because it allows a malicious Azure AD Administrator to reset the password of an arbitrary on-premises AD user privileged account to a known password value using Password writeback. This in turn allows the malicious Azure AD Administrator to gain privileged access to the customer’s on-premises AD.

See CVE-2017-8613 - Azure AD Connect Elevation of Privilege Vulnerability 

Suggested Actions

Verify if your organization is affected

This issue only affects customers who have enabled the Password writeback feature on Azure AD Connect. To determine if the feature is enabled:

  1. Login to your Azure AD Connect server.
  2. Start Azure AD Connect wizard (START → Azure AD Connect).
  3. On the Welcome screen, click Configure.
  4. On the Tasks screen, select View current configuration and click Next.
  5. Under Synchronization Settings, check if Password Writeback is enabled.

If Password writeback is enabled, evaluate whether your Azure AD Connect server has been granted Reset Password permission over on-premises AD privileged accounts. Azure AD Connect uses an AD DS account to synchronize changes with on-premises AD. The same AD DS account is used to perform password reset operation with on-premises AD. To identify which AD DS account is used:

  1. Login to your Azure AD Connect server.
  2. Start the Synchronization Service Manager (Start → Synchronization Service).
  3. Under the Connectors tab, select the on-premises AD connector and click Properties.

Mitigation steps

If you are unable to immediately upgrade to the latest “Azure AD Connect” version, consider the following options:

  • If the AD DS account is a member of one or more on-premises AD privileged groups, consider removing the AD DS account from the groups.
  • If an on-premises AD administrator has previously created Control Access Rights on the adminSDHolder object for the AD DS account which permits Reset Password operation, consider removing it.
  • It may not always be possible to remove existing permissions granted to the AD DS account (for example, the AD DS account relies on the group membership for permissions required for other features such as Password synchronization or Exchange hybrid writeback). Consider creating a DENY ACE on the adminSDHolder object which disallows the AD DS account with Reset Password permission. For information on how to create a DENY ACE using Windows DSACLS tool, refer to Modify the AdminSDHolder container.

Cisco Ransomware Defense

Ransomware is currently the most profitable and fastest growing industry within the Cyber-criminal framework. As our technology expands into every corner of our world, we seek to expand its ability to improve how we work and play. We look to the amazing breadth of capability that comes from such massive interconnectedness to bring efficiency and greater profit. However, this scale creates opportunities on many fronts. Just as it is easier today for anyone in the world to be part of the Internet, so is it easy, and cheaper, to leverage that same diversity of capability and vulnerability for massive criminal gains.

Ransomware, the practice of cryptographically holding your data hostage, is just the most current face of an old practice. Cybercriminals have always sought ways to generate revenue, obtain sensitive and intellectual property, or create greater social or political status. Like any effective business, the best methods are those that give scale, reduce the cost of production, and maximize the rate of return.

Combining the explosive growth in connected technologies (laden with vulnerabilities, but little built with security in mind or budget) with the anonymous advantages and rise of Bitcoin means easily deployed attacks are quickly and easily monetized. Why steal data to sell, when its owners will contribute to a more than $1 billion protection racket?

We will look at a few of the key phases of the Attack Chain that Ransomware follows, and how we can respond more effectively to these threats. Ransomware is much like any other malware (malicious software); it follows traditional delivery models (email and web delivery) with a focus on leveraging human behavior to drive deployment and execution. Time to Detection and Time to Response are now critical capabilities for cyber responders to both reduce the likelihood of ransomware exposure and limit the damage from those attacks that do succeed.

Cisco’s Ransomware Defense comprises:  

  • Cisco Umbrella, which blocks threats at the network layer, far away from your network •
  • Cisco Advanced Malware Protection (AMP) for Endpoints, which blocks malicious ransomware files from running on endpoints
  • Cisco Email Security, which stops phishing and spam messages seeking to deliver ransomware