An Okta login bug bypassed checking passwords on some lengthy usernames

Date:

Share post:

Illustration by Cath Virginia / The Verge | Picture from Getty Photos

On Friday night, Okta posted an odd replace to its listing of safety advisories. The most recent entry reveals that beneath particular circumstances, somebody may’ve logged in by getting into something for a password, however provided that the account’s username had over 52 characters.

Based on the observe individuals reported receiving, different necessities to take advantage of the vulnerability included Okta checking the cache from a earlier profitable login, and that a corporation’s authentication coverage didn’t add additional circumstances like requiring multi-factor authentication (MFA).

Listed here are the small print which can be at the moment accessible:

On October 30, 2024, a vulnerability was internally recognized in producing the cache key for AD/LDAP DelAuth. The Bcrypt algorithm was…

Proceed studying…

Related articles

The ten greatest issues I noticed at NAMM

The 2025 NAMM Present is over. Yearly music gear producers, starting from iconic synth manufacturers like Korg, to...

Gaming M&A and financing offers grew 39% in 2024 | Drake Star

Gaming mergers and acquisitions (M&A) and financings in 2024 grew 39% to $27.3 billion in disclosed deal worth...

AI brokers might start the primary one-person unicorn — however at what societal price?

Due to the appearance of cloud computing and distributed digital infrastructure, the one-person micro-enterprise is much from a...

The perfect 2025 Tremendous Bowl TV offers we may discover

The countdown to Tremendous Bowl LIX is underway, which implies it is a respectable time to seize a...