Recent AD NewsRecent PostsTop Read Articles

FIDO Downgrade Attack Hits Microsoft Entra ID

Researchers show how spoofing unsupported browsers can force users off passkeys, exposing Entra ID accounts to phishing and session hijack. 
Who/What/When: On August 13, 2025, security researchers detailed a FIDO downgrade attack against Microsoft Entra ID that manipulates login flows to sidestep passkeys.
Where/Why: By spoofing an unsupported browser, attackers trigger an error that removes FIDO prompts and pushes users to weaker fallback methods, enabling Adversary-in-the-Middle (AiTM) session theft. 

TL;DR

  • Attackers can force FIDO off by spoofing an unsupported browser, exposing weaker fallback paths.
  • AiTM kits then steal session cookies and take over accounts without passwords or MFA.
  • No widespread in-the-wild use reported yet, but targeted risk is real.
  • Mitigate by enforcing phishing-resistant methods with Conditional Access auth strengths and minimizing fallback.

 

Here’s the context

FIDO passkeys are designed to stop phishing by using device-bound cryptographic keys. They prevent credentials from traveling over the network. But enterprise identity systems often keep alternate sign-in paths for continuity and recovery.

That design opens a door: if the primary method is unavailable—or appears to be—users fall back to less secure methods that standard phishing kits can intercept.

 

What is a “FIDO downgrade attack”?

A technique that intentionally forces a login flow away from FIDO passkeys to a weaker fallback method, typically by spoofing an environment where FIDO is “unsupported,” making phishing and session hijack possible.

 

Why this matters now

The FIDO downgrade attack does not crack cryptography; it exploits fallback architecture. As passkeys expand, organizations must ensure that “unsupported” states trigger protective policy—not user choice. Enforce phishing-resistant methods, restrict recovery paths, and watch for downgrades.

 

Let us dive deep:

Why this works

  • The first principle: Security equals the strength of the weakest reachable path, not the strongest one.
  • What could be the silent dependency: If fallback exists and is reachable, attackers will try to force users into it.
  • The major compatibility gap: Some OS/browser pairs lack full FIDO support in Entra ID. Attackers exploit that gap with user-agent spoofing.

 

How the attack runs (step-by-step)

  1. Victim receives a phishing link to a proxied Entra ID page (AiTM kit such as Evilginx).
  2. The kit spoofsan unsupported browser user-agent (e.g., Safari on Windows) to the Entra ID backend.
  3. Entra ID disables passkeys and returns an error, prompting alternate sign-in.
  4. User selects a fallback (e.g., Microsoft Authenticator code, SMS, OTP).
  5. The proxy captures credentials and the MFA token or session cookie.
  6. Attacker imports the cookie and hijacks the session—no passkey or MFA required.

 

 

Microsoft Entra ID login page showing unsupported browser error
Microsoft Entra ID login error when FIDO is unavailable vs Fallback option in the right (example screenshot).

 

Implications & Consequences

Short term: Targeted account takeovers become feasible even for “phishing-resistant” users, especially admins and high-value roles.

Long term: Passkey rollouts that retain broad fallback paths will underperform. Organizations must govern which methods are allowed per resource and user risk.

 

What do experts say?

  • Weakest-link pathing: Don’t measure security by your best control; measure by the easiest successful route.
  • Compatibility pressure: “Works everywhere” often conflicts with “secure everywhere.” Treat “unsupported” as a policy event, not a silent fallback.
  • Session-centric threat: Modern phishing steals sessions, not just passwords.
  • Auth-strength as code: Control allowed methods with policy, not user choice at runtime.

 

Busting the myth and blind spots

  • Myth: “FIDO can’t be phished.” FIDO isn’t broken; it’s being bypassed by forcing weaker paths.
  • Blind spot: Fallback prompts feel normal to users. Without banners, logs, or policy blocks, downgrades slip by unnoticed.
  • Operational risk: Helpdesk recovery habits can widen the fallback surface if not constrained by policy.

 

Notable Statements

“This seemingly insignificant gap in functionality can be leveraged by attackers… the user would be forced to authenticate through a less secure method.”
— Proofpoint researcher Yaniv Miron

“The campaign is not the result of a product vulnerability… We recommend customers enforce phishing-resistant methods via Conditional Access authentication strength.”
— Microsoft spokesperson

 

Primary vs. Fallback: What’s at Risk?

Method Phishing Resistance AiTM Risk Recommended Use
FIDO Passkey (Security Key / Platform Auth) High Low (if enforced) Primary method for privileged and high-risk access
App Code / TOTP Medium Medium–High Tightly scoped; avoid for admin access
SMS / Voice Low High Last-resort recovery; consider disabling

 

FAQ / Quick Facts

What changed this week? Researchers demonstrated a working downgrade against Entra ID passkeys.

Does this break FIDO? No. It bypasses FIDO by removing it from the flow.

How is the bypass triggered? By spoofing an unsupported user-agent so the service hides FIDO and prompts fallback.

What do attackers steal? Credentials and/or the session cookie via an AiTM proxy.

What should admins do now? Enforce passkey-only where possible; restrict or disable fallback; alert on downgrades.

 

Practical Mitigations (Admin Checklist)

  1. Enforce authentication strengths that allow only phishing-resistant methods for sensitive apps and roles.
  2. Minimize fallback (disable SMS/voice; restrict OTP to low-risk contexts).
  3. Alert on downgrade events and unexpected method prompts.
  4. Harden helpdesk flows so recovery cannot silently weaken policy.
  5. Educate users: treat surprise “use another method” prompts as a red flag.

 

Further Reading

Here are some of our resources

Authoritative External Sources

Related posts
Hand-picked ResourcesRecent AD NewsRecent Posts

Storm-0501 Exploits Microsoft Entra ID to Wipe and Ransom Azure Data

Active Directory FundamentalsTop Read Articles

How to raise AD forest functional level

Active Directory FundamentalsAzure AD FundamentalsRecent Posts

Before migrating to Active Directory Domain Services (AD DS) 2022

Active Directory FundamentalsRecent Posts

How to change the IP address of a domain controller

×

There are over 8,500 people who are getting towards perfection in Active Directory, IT Management & Cyber security through our insights from Identitude.

Wanna be a part of our bimonthly curation of IAM knowledge?

  • -Select-
  • By clicking 'Become an insider', you agree to processing of personal data according to the Privacy Policy.