CVE-2024-43477

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to disable Verifiable ID's on other tenants in Decentralized Identity Services due to improper access control. It affects organizations using Microsoft's Decentralized Identity Services with Verifiable ID functionality. The attacker does not need any credentials or authentication to exploit this flaw.

💻 Affected Systems

Products:
  • Microsoft Decentralized Identity Services
Versions: Specific versions not publicly disclosed; check Microsoft advisory for details
Operating Systems: Cloud service - OS independent
Default Config Vulnerable: ⚠️ Yes
Notes: Affects tenants using Verifiable ID functionality within Decentralized Identity Services

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could systematically disable all Verifiable ID's across multiple tenants, disrupting identity verification services and potentially causing service outages or authentication failures.

🟠

Likely Case

Targeted attacks disabling specific Verifiable ID's on high-value tenants, causing temporary disruption to identity verification processes.

🟢

If Mitigated

With proper network segmentation and access controls, impact would be limited to specific exposed services only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Microsoft has not disclosed technical details; exploitation appears straightforward based on CVSS and description

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Microsoft security update for specific version

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43477

Restart Required: No

Instructions:

1. Review Microsoft security advisory 2. Apply Microsoft-provided updates for Decentralized Identity Services 3. Verify service functionality post-update

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to Decentralized Identity Services endpoints to trusted sources only

Monitoring and Alerting

all

Implement monitoring for Verifiable ID disablement events and set up alerts for suspicious patterns

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to Decentralized Identity Services
  • Enable enhanced logging and monitoring for all Verifiable ID operations and disablement events

🔍 How to Verify

Check if Vulnerable:

Check if your tenant uses Microsoft Decentralized Identity Services with Verifiable ID functionality and review Microsoft security advisory for affected versions

Check Version:

Check Azure portal or Microsoft 365 admin center for service version information

Verify Fix Applied:

Verify that Microsoft security updates have been applied and test Verifiable ID functionality remains operational

📡 Detection & Monitoring

Log Indicators:

  • Unexpected Verifiable ID disablement events
  • Unauthenticated API calls to identity services
  • Multiple disablement requests from single source

Network Indicators:

  • Unusual traffic patterns to Decentralized Identity Services endpoints
  • Requests bypassing authentication mechanisms

SIEM Query:

source="AzureAD" OR source="MicrosoftIdentity" AND (event_type="VerifiableID_Disabled" OR operation="DisableVerifiableID") AND user_authenticated="false"

🔗 References

📤 Share & Export