Date:

An Okta login bug bypassed checking passwords on some lengthy usernames


Illustration by Cath Virginia / The Verge | Photograph from Getty Photographs

On Friday night, Okta posted an odd replace to its record of safety advisories. The newest entry reveals that below particular circumstances, somebody may’ve logged in by coming into something for a password, however provided that the account’s username had over 52 characters.

In accordance with the word folks reported receiving, different necessities to use the vulnerability included Okta checking the cache from a earlier profitable login, and that a corporation’s authentication coverage didn’t add additional situations like requiring multi-factor authentication (MFA).

Listed below are the main points which can be at the moment out there:

On October 30, 2024, a vulnerability was internally recognized in producing the cache key for AD/LDAP DelAuth. The Bcrypt algorithm was…

Proceed studying…

Latest stories

Read More

LEAVE A REPLY

Please enter your comment!
Please enter your name here