Duo Product Security Advisory
Advisory ID: DUO-PSA-2014-005
Publication Date: 2014-05-12
Revision Date: 2014-05-27
Status: Confirmed, Fixed
Document Revision: 3
Overview
Duo Security has identified an issue in its Credential-Provider based Remote Desktop Protocol (RDP) integrations (e.g. those installed on Windows versions from Vista / Server 2008) which may allow a user with an expired password to - upon completing primary and secondary authentication - switch to another user account using that account's primary credentials, skipping secondary authentication for that account.
Description
The RDP integration works to add two-factor authentication to Windows logins, both Remote Desktop and (optionally) the local console. When a user has provided valid credentials (username and password), the integration presents a second-factor authentication dialog for the provided username. Under normal operation, when the second-factor authentication is successful, the user is logged on.
However, if the user's password has expired, then rather than logging the user in, the system will instead present a prompt requesting a password change. At this prompt, the user may type in a new (different) username and corresponding password - and if these credentials are valid, the user can proceed to log in with (and reset the password for) the new username without any corresponding second-factor authentication challenge for the new username.
Impact
A valid user (with a valid username/password and secondary authenticator) may, if his/her password expires, be able to login to another user account using only that account's username/password - i.e. without secondary authentication - after completing primary and secondary authentication for his/her own account.
Affected Product(s)
- Duo RDP Integration (Credential-Provider based) versions 1.0.7 through 1.1.4, running on Windows Vista, Server 2008, and newer.
Solution
Install the latest version of the Duo Security RDP Integration (currently, version 1.1.7) on your host. The latest version can be downloaded at https://dl.duosecurity.com/duo-win-login-latest.exe
Vulnerability Metrics
Vulnerability Class: Privilege Context Switching Error (CWE-270)
Remotely Exploitable: No
Authentication Required: Yes
Severity: Medium
CVSSv2 Overall Score: 5.1
CVSSv2 Group Scores: Base: 5.3, Temporal: 4.6, Environmental: 5.1
CVSSv2 Vector: (AV:L/AC:H/Au:M/C:C/I:C/A:N/E:ND/RL:OF/RC:C/CDP:ND/TD:ND/CR:H/IR:H/AR:ND)
References
- CWE-270: Privilege Context Switching Error - https://cwe.mitre.org/data/definitions/270.html
Timeline
2014-03-21
- Duo discovers issue internally, identifies and implements fix
2014-04-01
- Release is posted on dl.duosecurity.com
2014-04-03
- Advisory is drafted, Duo performs additional testing
2014-05-12
- Advisory is shared with affected Enterprise customers
2014-05-20
- Advisory is shared with affected Business customers
- Version number incremented to reflect timeline update
2014-05-27
- Advisory is shared with affected Personal and Trial customers
- Version number incremented to reflect timeline update
Credits/Contact
Feedback regarding this issue should be sent to support@duosecurity.com and reference "DUO-PSA-2014-005" in the subject.