A Microsoft Authenticator flaw is bricking accounts – here’s how to fix it
Users are having their accounts overwritten by the Microsoft Authenticator service – and it's an issue that's been happening for years
A design flaw affecting the Microsoft Authenticator is locking users out of their MFA-protected accounts, causing chaos as staff spend hours troubleshooting the issue with IT helpdesks.
Originally reported by CSO Online, the issue occurs when users attempt to add a new account by scanning a QR code, now the most popular way to quickly add an account, but when using this method, the authenticator will overwrite any account with the same username as the new entry.
This stems from the particular way Microsoft has configured its authentication service, which only uses the username to differentiate accounts, unlike Google and similar competing systems which also add the name of the issuer to the account.
This is by no means a new problem. Users have been complaining about the issue in Microsoft support channels as far back as 2020, and it looks like the issue has been persistent since the authenticator was released in 2016.
Last week, Brett Randall, founder and principal consultant at Fractl, took to LinkedIn to complain about the issue, shedding light on the issue once more.
Randall said he dug into the issue after observing the authenticator overwriting another application’s TOTP key when using the QR code to scan for MFA in a training session with a vendor.
But after reporting the issue to Microsoft, Randall reported being told the bug was ‘by design’, stating that trying to get the company to recognize the problem and do something about it has been “nigh on impossible”.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
“Watching a room full of people lose access to other systems as they gradually scanned a QR code and Microsoft Authenticator overwrote their keys to other systems was painful.”
This creates further confusion as organizations often misattribute who is responsible for the problem, and get in touch with the company issuing the authentication, wasting hours with their helpdesk trying to fix an issue that has nothing to do with the firm.
Microsoft Authenticator issue can be fixed
There are workarounds available, however, as one user posting on Microsoft Learn noted in 2022. The workaround involves manually entering the secret key from the identity provider into the Authenticator app during setup.
But they noted this is not a particularly practical fix when it comes to large enterprises.
“Unfortunately, this is not very helpful in an enterprise environment, especially when the average end user rarely knows anything about the inner workings of Authentication, and seeing a random string of characters is intimidating.”
As multi factor authentication (MFA) becomes the default protection layer on most user accounts, there is increasing reliance on these systems for access to digital systems.
RELATED WHITEPAPER
As such, these tools need to be as robust as possible, or risk locking millions of users out of their accounts.
Glenn Chishold, chief product officer at Obsidian, said that because the majority of organizations recognize the importance of using MFA to secure their accounts, vendors need to ensure their solutions are reliable enough to withstand increased pressure on them.
"We know that MFA is crucial in protecting against basic forms of compromise. Even so, we see major breaches using accounts that only have basic authentication enabled (like the breach that affected AT&T's Snowflake instance),” he explained.
“With the vast majority of users choosing to use their mobile device for MFA, it's beholden on vendors to ensure that these technologies are easy to adopt and difficult to circumvent.”
Chisholm added that security professionals should be wary that as users flood IT support channels trying to troubleshoot the issue, they are prime targets for social engineering attacks looking to gain a foothold on the network.
"Unfortunately in this instance, the ‘expected behavior’ of the Microsoft authenticator app can cause overwrites of existing accounts. That might mean that enterprises need to help their users re-establish access to their accounts,” he said.
“Security teams need to be aware that this might also provide an opportunity for attackers to socially engineer helpdesk users, convincing them to grant unauthorized access to users accounts, as we saw in the well-documented MGM breach."

Solomon Klappholz is a former staff writer for ITPro and ChannelPro. He has experience writing about the technologies that facilitate industrial manufacturing, which led to him developing a particular interest in cybersecurity, IT regulation, industrial infrastructure applications, and machine learning.
-
AWS just quietly increased EC2 Capacity Block prices – here's what you need to knowNews The AWS price increases mean booking GPU capacity in advance just got more expensive
-
Accenture acquires Faculty, poaches CEO in bid to drive client AI adoptionNews The Faculty acquisition will help Accenture streamline AI adoption processes
-
These Microsoft Teams security features will be turned on by default this month – here's what admins need to knowNews From 12 January, weaponizable file type protection, malicious URL detection, and a system for reporting false positives will all be automatically activated.
-
The Microsoft bug bounty program just got a big update — and even applies to third-party codeNews Microsoft is expanding its bug bounty program to cover all of its products, even those that haven't previously been covered by a bounty before and even third-party code.
-
Microsoft Teams is getting a new location tracking feature that lets bosses snoop on staff – research shows it could cause workforce pushbackNews A new location tracking feature in Microsoft Teams will make it easier to keep tabs on your colleague's activities – and for your boss to know exactly where you are.
-
Microsoft opens up Entra Agent ID preview with new AI featuresNews Microsoft Entra Agent ID aims to help manage influx of AI agents using existing tools
-
A notorious ransomware group is spreading fake Microsoft Teams ads to snare victimsNews The Rhysida ransomware group is leveraging Trusted Signing from Microsoft to lend plausibility to its activities
-
CISA just published crucial new guidance on keeping Microsoft Exchange servers secureNews With a spate of attacks against Microsoft Exchange in recent years, CISA and the NSA have published crucial new guidance for organizations to shore up defenses.
-
CISA issues alert after botched Windows Server patch exposes critical flawNews A critical remote code execution flaw in Windows Server is being exploited in the wild, despite a previous 'fix'
-
Microsoft issues warning over “opportunistic” cyber criminals targeting big businessNews Microsoft has called on governments to do more to support organizations