Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
OneLogin AD Connector Vulnerabilities Exposes Authentication Credentials

OneLogin AD Connector Vulnerabilities Exposes Authentication Credentials

Posted on June 12, 2025June 12, 2025 By CWS

A complete safety investigation has revealed crucial vulnerabilities in OneLogin’s Energetic Listing (AD) Connector service that uncovered authentication credentials and enabled attackers to impersonate authentic customers throughout enterprise environments.

The vulnerabilities, which have an effect on OneLogin’s widely-used identification and entry administration platform, demonstrated how menace actors might leverage uncovered credentials to generate legitimate JSON Net Tokens (JWT) and acquire unauthorized entry to buyer techniques.

The safety flaws emerged by analysis carried out on OneLogin’s trial tenant system, which gives potential prospects with entry to assessment the platform’s options and performance.

What started as routine safety evaluation shortly escalated when researchers found that OneLogin’s AD Connector service was inadvertently exposing delicate authentication supplies by its API endpoints.

The connector service, deployed as ConnectorService.exe on Home windows area controllers, was discovered to transmit unencrypted credentials by configuration API calls, creating a big assault floor for malicious actors.

SpecterOps analysts recognized a number of crucial publicity factors inside the OneLogin infrastructure, together with cleartext AWS credentials, API keys, and cryptographic signing keys important for JWT token technology.

The analysis revealed that attackers might exploit these uncovered credentials to craft authentic authentication tokens, successfully bypassing OneLogin’s safety controls and impersonating any person synchronized with the listing service.

Lab Setup (Supply – Specterops)

This vulnerability chain demonstrated a whole compromise state of affairs the place preliminary credential publicity might result in widespread unauthorized entry throughout a corporation’s federated purposes.

The impression of those vulnerabilities extends far past easy credential theft, as OneLogin serves as a centralized identification supplier for quite a few enterprise prospects.

When compromised, these techniques can present attackers with broad entry throughout a corporation’s total software ecosystem, together with cloud providers, on-premises purposes, and third-party integrations.

The analysis highlighted how identification federation platforms have grow to be high-value targets as a result of their central position in fashionable enterprise safety architectures.

Technical Exploitation Mechanism

The vulnerability exploitation course of centered on OneLogin’s configuration API endpoint positioned at which returned delicate configuration knowledge when queried with correct listing tokens.

Researchers found that this endpoint uncovered crucial info together with API keys, AWS AKIA person credentials in cleartext, and base64-encoded signing keys essential for JWT token creation.

The uncovered AWS credentials revealed a very regarding discovering when researchers tried to entry the referenced S3 bucket onelogin-adc-logs-production and found it was unclaimed.

By registering this bucket on a private AWS account, researchers started receiving manufacturing log recordsdata from an precise OneLogin buyer, containing detailed LDAP properties for all synchronized customers and legitimate listing tokens.

JWT tokens (Supply – Specterops)

This represented a whole breach of buyer knowledge confidentiality and highlighted systemic points in OneLogin’s infrastructure administration.

The technical exploitation relied closely on reverse engineering OneLogin’s .NET ConnectorService.exe binary to know JWT token building.

Utilizing decompilation instruments, researchers recognized the required JWT fields together with expiration time (exp), issuer (iss), viewers (aud), and topic (sub) values.

A Python script was developed to generate legitimate JWT tokens utilizing the uncovered signing keys, demonstrating the sensible exploit functionality.

The authentication course of concerned posting these crafted tokens to OneLogin’s SSO shopper URL, successfully bypassing all authentication controls and granting entry to federated purposes as any impersonated person.

This vulnerability chain represents a crucial failure in safe credential administration and API design, the place a single uncovered endpoint might compromise a complete buyer’s identification infrastructure.

The analysis underscores the significance of treating identification federation platforms as Tier 0 belongings requiring the best ranges of safety safety and monitoring.

Automate menace response with ANY.RUN’s TI Feeds—Enrich alerts and block malicious IPs throughout all endpoints -> Request full entry

Cyber Security News Tags:Authentication, Connector, Credentials, Exposes, OneLogin, Vulnerabilities

Post navigation

Previous Post: Trend Micro Apex One Vulnerability Allow Attackers to Inject Malicious Code
Next Post: New ‘SmartAttack’ Steals Air-Gapped Data Using Smartwatches

Related Posts

DragonForce Ransomware Group – The Rise of a Relentless Cyber Threat in 2025 DragonForce Ransomware Group – The Rise of a Relentless Cyber Threat in 2025 Cyber Security News
Apache Log4j Vulnerability Allow Attackers to Intercept Sensitive Log Data Apache Log4j Vulnerability Allow Attackers to Intercept Sensitive Log Data Cyber Security News
How to Solve Alert Fatigue in Your SOC without Extra Staff or Effort How to Solve Alert Fatigue in Your SOC without Extra Staff or Effort Cyber Security News
SideWinder APT Hackers Attacking Indian Entities by Masquerading as the Income Tax Department of India SideWinder APT Hackers Attacking Indian Entities by Masquerading as the Income Tax Department of India Cyber Security News
APT36 Hackers Attacking Indian Government Entities to Steal Login Credentials APT36 Hackers Attacking Indian Government Entities to Steal Login Credentials Cyber Security News
Hackers Leverage Built-in MacOS Protection Features to Deploy Malware Hackers Leverage Built-in MacOS Protection Features to Deploy Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News