Date:

Okta’s ‘safe by design’ pledge suffers a buggy setback



The flaw is an apparent oversight of no less than one of many seven commitments inside CISA’s safe by design ideas, which embrace imposing multi issue authentication (MFA), lowering default passwords, lowering lessons of vulnerability, making use of safety patches, vulnerability enumeration and disclosure, and proof of intrusions.

Cache key era isn’t safe by design

The vulnerability, which was launched by way of a routine July 23, 2024 replace, stems from Okta’s use of the Bcrypt algorithm to generate a cache key the place it hashes a mixed string of consumer id, username, and password.

Within the case of usernames that had been 52 characters lengthy, or longer, the saved cache key from a earlier profitable login try allowed re-login, successfully bypassing the necessity for a password.

Latest stories

Read More

LEAVE A REPLY

Please enter your comment!
Please enter your name here