Skip to main content

CVE-2024-21381: CWE-352: Cross-Site Request Forgery (CSRF) in Microsoft Entra

Medium
VulnerabilityCVE-2024-21381cvecve-2024-21381cwe-352
Published: Tue Feb 13 2024 (02/13/2024, 18:02:19 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Entra

Description

Microsoft Azure Active Directory B2C Spoofing Vulnerability

AI-Powered Analysis

AILast updated: 06/26/2025, 08:08:37 UTC

Technical Analysis

CVE-2024-21381 is a Cross-Site Request Forgery (CSRF) vulnerability identified in Microsoft Entra, specifically affecting version 1.0.0 of the product. Microsoft Entra is a component of the Azure Active Directory B2C (Business to Consumer) service, which is widely used for identity and access management in cloud environments. The vulnerability is classified under CWE-352, indicating that it allows an attacker to trick an authenticated user into submitting a forged request to the Entra service without their consent or knowledge. This can lead to unauthorized actions being performed with the privileges of the victim user. The CVSS v3.1 base score is 6.8 (medium severity), with the vector indicating a network attack vector (AV:N), high attack complexity (AC:H), low privileges required (PR:L), no user interaction needed (UI:N), unchanged scope (S:U), and high impact on confidentiality and integrity (C:H/I:H) but no impact on availability (A:N). The exploitability is partially functional (E:P), with an official fix planned (RL:O) and confirmed (RC:C). No known exploits are currently reported in the wild, and no patch links have been published yet. The vulnerability could allow an attacker to perform spoofing or unauthorized actions within the Azure AD B2C environment by leveraging the CSRF flaw, potentially leading to data leakage or manipulation of identity-related configurations.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the widespread adoption of Microsoft Azure services, including Azure AD B2C, for identity management and customer-facing applications. Exploitation could lead to unauthorized access or modification of user identities, potentially resulting in data breaches, identity theft, or disruption of authentication workflows. Given the high impact on confidentiality and integrity, sensitive personal data protected under GDPR could be exposed or altered, leading to regulatory non-compliance and reputational damage. The absence of required user interaction increases the risk of automated or stealthy attacks. Organizations relying on Entra for managing consumer identities or internal access control could face elevated risks, especially if they have not implemented additional CSRF protections or compensating controls. The medium severity rating suggests that while the vulnerability is serious, exploitation complexity and required privileges somewhat limit immediate widespread impact, but targeted attacks against high-value accounts or services remain a concern.

Mitigation Recommendations

European organizations should prioritize the following specific mitigation steps: 1) Monitor Microsoft’s official security advisories closely for the release of patches or updates addressing CVE-2024-21381 and apply them promptly once available. 2) Implement additional CSRF protections at the application layer, such as anti-CSRF tokens, strict SameSite cookie attributes, and validating the Origin and Referer headers on sensitive requests within applications integrating with Entra. 3) Restrict and monitor privileged accounts with minimal necessary permissions to reduce the impact of potential CSRF exploitation. 4) Employ network-level controls such as Web Application Firewalls (WAFs) configured to detect and block suspicious CSRF-like request patterns targeting Entra endpoints. 5) Conduct regular security assessments and penetration tests focusing on identity management workflows to identify and remediate CSRF and related vulnerabilities. 6) Educate developers and administrators about secure coding practices related to CSRF and identity management APIs. 7) Review and tighten session management policies to limit session lifetimes and enforce multi-factor authentication (MFA) to reduce the risk of session hijacking or misuse.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2023-12-08T22:45:20.452Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9836c4522896dcbeabbc

Added to database: 5/21/2025, 9:09:10 AM

Last enriched: 6/26/2025, 8:08:37 AM

Last updated: 8/16/2025, 11:00:28 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats