An Okta login bug bypassed checking passwords on some lengthy usernames

Date:

Share post:

Illustration by Cath Virginia / The Verge | Picture from Getty Photos

On Friday night, Okta posted an odd replace to its listing of safety advisories. The most recent entry reveals that beneath particular circumstances, somebody may’ve logged in by getting into something for a password, however provided that the account’s username had over 52 characters.

Based on the observe individuals reported receiving, different necessities to take advantage of the vulnerability included Okta checking the cache from a earlier profitable login, and that a corporation’s authentication coverage didn’t add additional circumstances like requiring multi-factor authentication (MFA).

Listed here are the small print which can be at the moment accessible:

On October 30, 2024, a vulnerability was internally recognized in producing the cache key for AD/LDAP DelAuth. The Bcrypt algorithm was…

Proceed studying…

Related articles

Proton’s VPN app now works natively on Home windows ARM gadgets

Proton's newest VPN app will probably be among the many first to work natively on Home windows ARM...

Apple’s new widget places Election Day updates in your Lock Display and Residence Display

It’s Election Day within the U.S., which implies you’re doubtless glued to the newest information about which presidential...

Apple may add ChatGPT subscription choice to iOS 18.2

MacRumors seen an uncommon function within the second iOS 18.2 developer beta, exhibiting that Apple could let customers...

Nodal connects hopeful mother and father with surrogates as reproductive freedom hangs in limbo

Many individuals who wish to have youngsters can’t, or shouldn’t, carry a being pregnant for quite a lot...