Microsoft fixes flaw after being called irresponsible by Tenable CEO

Share:

Microsoft fixed a security flaw in the Power Platform Custom Connectors feature that let unauthenticated attackers access cross-tenant applications and Azure customers’ sensitive data after being called “grossly irresponsible” by Tenable’s CEO.

The root cause of the issue stemmed from inadequate access control measures for Azure Function hosts launched by connectors within the Power Platform. These connectors use custom C# code integrated into a Microsoft-managed Azure Function featuring an HTTP trigger.

Although customer interaction with custom connectors usually happens via authenticated APIs, the API endpoints facilitated requests to the Azure Function without enforcing authentication.

This created an opportunity for attackers to exploit unsecured Azure Function hosts and intercept OAuth client IDs and secrets.

“It should be noted that this is not exclusively an issue of information disclosure, as being able to access and interact with the unsecured Function hosts, and trigger behavior defined by custom connector code, could have further impact,” says cybersecurity firm Tenable which discovered the flaw and reported it on March 30th.

“However, because of the nature of the service, the impact would vary for each individual connector, and would be difficult to quantify without exhaustive testing.”

“To give you an idea of how bad this is, our team very quickly discovered authentication secrets to a bank. They were so concerned about the seriousness and the ethics of the issue that we immediately notified Microsoft,” Tenable CEO Amit Yoran added.

Tenable also shared proof of concept exploit code and information on the steps required to find vulnerable connector hostnames and how to craft the POST requests to interact with the unsecured API endpoints.

Attack flow Power Platform bug
Attack flow Power Platform bug (Tenable)

While investigating Tenable’s report, the company initially found that the researcher was the only one who exploited the issue. After further analysis in July, Microsoft determined that there were some Azure Functions in a “soft delete” state that had not been properly mitigated.

Microsoft finally resolved the issue for all customers on August 2nd after an initial fix deployed by Redmond on June 7th was tagged by Tenable as incomplete.

“This issue has been fully addressed for all customers and no customer remediation action is required,” Microsoft said on Friday.

Redmond has since notified all impacted customers through the Microsoft 365 Admin Center starting August 4th.

Even though Microsoft says the information disclosure issue was addressed for all Azure customers, Tenable believes the fix applies only to newly deployed Power Apps and Power Automation custom connectors.

“Microsoft has fixed the issue for newly deployed connectors by requiring Azure Function keys to access the Function hosts and their HTTP trigger,” Tenable says.

“We would refer customers who require additional details regarding the nature of the deployed remediations to Microsoft for authoritative answers.”

Fix only came after public criticism

Microsoft addressed the flaw after a five-month period, but not before the CEO of Tenable voiced vehement criticism against the initial response. Yoran condemned Microsoft’s approach as “grossly irresponsible” and “blatantly negligent.”

To make matters even worse, Redmond’s initial commitment to fixing the issue in September deviated by a large margin from the expected 90-day deadline, typically adhered to by most vendors when it comes to patching security vulnerabilities.

This extended delay added to the concerns and raised additional questions about the timeliness of Microsoft’s response to security issues affecting found within its products.

“Did Microsoft quickly fix the issue that could effectively lead to the breach of multiple customers’ networks and services? Of course not. They took more than 90 days to implement a partial fix – and only for new applications loaded in the service,” Yoran said.

“That means that as of today, the bank I referenced above is still vulnerable, more than 120 days since we reported the issue, as are all of the other organizations that had launched the service prior to the fix.

“And, to the best of our knowledge, they still have no idea they are at risk and therefore can’t make an informed decision about compensating controls and other risk mitigating actions.”

 

(c) Lawrence Abrams

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
10:31 am, May 18, 2025
weather icon 12°C
L: 11° | H: 14°
scattered clouds
Humidity: 68 %
Pressure: 1020 mb
Wind: 3 mph E
Wind Gust: 10 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 29%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 5:04 am
Sunset: 8:49 pm
DailyHourly
Daily ForecastHourly Forecast
Today 10:00 pm
weather icon
11° | 14°°C 0 mm 0% 8 mph 64 % 1020 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
9° | 19°°C 0.2 mm 20% 12 mph 80 % 1022 mb 0 mm/h
Tue May 20 10:00 pm
weather icon
9° | 21°°C 0 mm 0% 8 mph 71 % 1023 mb 0 mm/h
Wed May 21 10:00 pm
weather icon
12° | 18°°C 1 mm 100% 7 mph 89 % 1020 mb 0 mm/h
Thu May 22 10:00 pm
weather icon
9° | 19°°C 0 mm 0% 8 mph 59 % 1022 mb 0 mm/h
Today 1:00 pm
weather icon
13° | 15°°C 0 mm 0% 8 mph 62 % 1020 mb 0 mm/h
Today 4:00 pm
weather icon
16° | 18°°C 0 mm 0% 8 mph 49 % 1019 mb 0 mm/h
Today 7:00 pm
weather icon
16° | 16°°C 0 mm 0% 7 mph 47 % 1019 mb 0 mm/h
Today 10:00 pm
weather icon
13° | 13°°C 0 mm 0% 7 mph 64 % 1020 mb 0 mm/h
Tomorrow 1:00 am
weather icon
12° | 12°°C 0 mm 0% 7 mph 71 % 1020 mb 0 mm/h
Tomorrow 4:00 am
weather icon
9° | 9°°C 0 mm 0% 6 mph 80 % 1021 mb 0 mm/h
Tomorrow 7:00 am
weather icon
10° | 10°°C 0 mm 0% 6 mph 74 % 1021 mb 0 mm/h
Tomorrow 10:00 am
weather icon
16° | 16°°C 0 mm 0% 8 mph 55 % 1021 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€93,158.33
0.85%
Ethereum(ETH)
€2,258.30
1.74%
Tether(USDT)
€0.90
0.00%
XRP(XRP)
€2.15
1.21%
Solana(SOL)
€153.50
2.04%
USDC(USDC)
€0.90
0.00%
Dogecoin(DOGE)
€0.201238
4.22%
Shiba Inu(SHIB)
€0.000013
4.53%
Pepe(PEPE)
€0.000012
7.31%
Peanut the Squirrel(PNUT)
€0.321447
25.20%
Scroll to Top