Password resets are often the first response to a suspected compromise. It makes sense; resetting credentials is a quick way to cut off an attacker’s most obvious path back in.
However, that doesn’t always completely solve the issue. In both Active Directory (AD) and hybrid Entra ID environments, password changes do not immediately invalidate the old credential across every authentication path.
Even a short window is an opportunity that potentially allows attackers to maintain access or re-establish a foothold.
For security architects and IT administrators, this gap has real implications during incident response.
The password reset gap
Windows systems cache password hashes locally to support offline logon. If a device hasn’t reconnected to the domain, it may still hold the previous credential in a usable form. In hybrid environments, there can also be a short delay before the new password syncs to Entra ID.
This means there are three possible states created after a password reset:
1. The user has logged in with the new credential while connected to AD. The cached credential store updates, invalidating the old hash.
2. The user has not logged in to a particular machine since the reset. The old cached credential may still be usable for certain authentication attempts.
3. In hybrid deployments, the password has been reset in AD but the new hash has not yet synchronized to Entra ID. The old password may still authenticate during the password hash synchronization interval.
... continue reading