КућаЦИИ/ОТOkta Resolves Authentication Bypass Vulnerability Following 3-Month Period of Inactivity

Okta Resolves Authentication Bypass Vulnerability Following 3-Month Period of Inactivity

Објављено на

spot_img

Okta has recently addressed a security flaw that could have potentially allowed cybercriminals to bypass authentication using just a username. This vulnerability primarily affected individuals with long usernames or employers with lengthy domain names, requiring usernames with 52 characters or more to meet one of the exploit conditions.

The exploit targeted Okta AD/LDAP delegated authentication (DelAuth) and required additional conditions to be met for successful exploitation. These included the user having previously authenticated, creating a cache of the authentication, and the cache being used first in certain situations where the AD/LDAP agent was unavailable.

While the use of a 52-character username may seem uncommon, some users opt to use their email addresses as their usernames, making this scenario plausible. The authentication company highlighted the importance of customers checking their logs for any suspicious authentication attempts dating back to July 23, as the vulnerability was only discovered by Okta on Oct. 30.

In response to this security flaw, Okta recommended that customers implement multifactor authentication (MFA) as a minimum security measure, as MFA was not part of the exploitation preconditions. It is crucial for organizations to stay vigilant and ensure that their systems are adequately protected against potential threats.

Despite the security patch being implemented by Okta, it remains unclear whether there were any in-the-wild exploitation attempts. Okta did not provide immediate comment on this matter when reached out to by Dark Reading for clarification.

As cybersecurity threats continue to evolve, it is imperative for companies to prioritize the security of their systems and data. Implementing robust security measures and staying informed about potential vulnerabilities are essential steps in safeguarding against malicious attacks. Okta’s swift response to this authentication bypass bug underscores the importance of proactive security measures in today’s increasingly digitized world.

Извор линк

Најновији чланци

Hacker Group Announces Publicly They Are Recruiting Pentesters

Recently, a hacker group known as 62IX has made waves by publicly announcing their...

4 Main API Security Risks Organizations Need to Address

Security vulnerabilities in the APIs powering modern digital services and applications have become a...

Chinese hackers target Microsoft customers with advanced password spray attacks

A network of compromised devices known as CovertNetwork-1658 has been identified by researchers, revealing...

Cybercriminals are Misusing DocuSign APIs to Send Bogus Invoices

In recent news, cybersecurity researchers have uncovered a concerning trend in which cybercriminals are...

Више овако

Hacker Group Announces Publicly They Are Recruiting Pentesters

Recently, a hacker group known as 62IX has made waves by publicly announcing their...

4 Main API Security Risks Organizations Need to Address

Security vulnerabilities in the APIs powering modern digital services and applications have become a...

Chinese hackers target Microsoft customers with advanced password spray attacks

A network of compromised devices known as CovertNetwork-1658 has been identified by researchers, revealing...
sr_RSSerbian