This is someone trying to spin a CVE out of the way Windows has handled password caching for literal decades. If it can’t reach the IDP, it allows you to log in using the last confirmed valid password.

Of course CA won’t work if you can’t reach Entra to pull them. Of course the machine can’t require you to use the newest password if it can’t reach AD to check against it instead of the cached one. This is basic fucking functionality that any serious Windows admin should already be familiar with.

It’s definitely an interesting edge case where you can’t reach Entra or AD but the device can still be reached by RDP, but this “security hole” is literally what the caching is meant for. Maintaining the ability to access the machine if the IDP isn’t reachable.

It’s how almost any org usin…

Similar Posts

Loading similar posts...

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help