BotBeat
...
← Back

> ▌

MicrosoftMicrosoft
RESEARCHMicrosoft2026-03-12

Critical Azure Active Directory Vulnerability Discovered: Family Refresh Tokens Enable Unauthorized Persistence

Key Takeaways

  • ▸Azure AD contains undocumented family refresh token functionality that deviates from OAuth 2.0 standards, allowing cross-client token redemption
  • ▸Attackers can exploit family refresh tokens through device code phishing and SSO abuse to gain persistent access to Microsoft 365 and Azure resources
  • ▸The vulnerability enables privilege escalation and lateral movement across Microsoft cloud services by obtaining bearer tokens as different client applications
Source:
Hacker Newshttps://github.com/secureworks/family-of-client-ids-research↗

Summary

Security researchers at Secureworks discovered a critical undocumented functionality in Azure Active Directory that allows attackers to abuse "family refresh tokens" to gain unauthorized access to Microsoft cloud resources and establish persistence. The vulnerability, identified in 2022, exploits a quirk in Microsoft's OAuth 2.0 implementation where a group of Microsoft OAuth client applications can obtain special family refresh tokens that can be redeemed for bearer tokens as any other client in the family. This represents a significant deviation from the OAuth 2.0 specification and creates multiple attack vectors for privilege escalation and lateral movement. The researchers documented various attack paths including device code phishing and single sign-on abuse, while also providing mitigation strategies such as conditional access policies, sign-in log auditing, and refresh token revocation.

  • Mitigation requires implementation of conditional access policies, comprehensive sign-in log auditing, and proactive refresh token revocation strategies

Editorial Opinion

This discovery highlights a critical gap between OAuth 2.0 specification compliance and real-world implementation practices at scale. While Microsoft's modifications to support enterprise-scale services may have operational benefits, the undocumented nature of family refresh tokens and their security implications represent a significant risk that should have been disclosed more transparently. Organizations relying on Azure AD need to immediately review their access controls and implement the recommended mitigations to protect against this attack vector.

CybersecurityAI Safety & AlignmentPrivacy & Data

More from Microsoft

MicrosoftMicrosoft
PRODUCT LAUNCH

Microsoft Launches Comprehensive Agent Framework for Building and Orchestrating AI Agents

2026-04-04
MicrosoftMicrosoft
POLICY & REGULATION

Microsoft's Own Terms Reveal Copilot Is 'For Entertainment Purposes Only' and Cannot Be Trusted for Important Decisions

2026-04-03
MicrosoftMicrosoft
PRODUCT LAUNCH

Microsoft AI Announces Three New Multimodal Models: MAI-Transcribe-1, MAI-Voice-1, and MAI-Image-2

2026-04-03

Comments

Suggested

OracleOracle
POLICY & REGULATION

AI Agents Promise to 'Run the Business'—But Who's Liable When Things Go Wrong?

2026-04-05
AnthropicAnthropic
POLICY & REGULATION

Anthropic Explores AI's Role in Autonomous Weapons Policy with Pentagon Discussion

2026-04-05
PerplexityPerplexity
POLICY & REGULATION

Perplexity's 'Incognito Mode' Called a 'Sham' in Class Action Lawsuit Over Data Sharing with Google and Meta

2026-04-05
← Back to news
© 2026 BotBeat
AboutPrivacy PolicyTerms of ServiceContact Us