An Okta login bug bypassed checking passwords on some lengthy usernames

Date:

Share post:

Illustration by Cath Virginia / The Verge | Photograph from Getty Photos

On Friday night, Okta posted an odd replace to its record of safety advisories. The most recent entry reveals that underneath particular circumstances, somebody may’ve logged in by coming into something for a password, however provided that the account’s username had over 52 characters.

Based on the observe folks reported receiving, different necessities to take advantage of the vulnerability included Okta checking the cache from a earlier profitable login, and that a corporation’s authentication coverage didn’t add additional situations like requiring multi-factor authentication (MFA).

Listed below are the small print which might be at present out there:

On October 30, 2024, a vulnerability was internally recognized in producing the cache key for AD/LDAP DelAuth. The Bcrypt algorithm was…

Proceed studying…

Related articles

Russia bans crypto mining in a number of areas

It’s that quiet, end-of-December interval for tech information. Nonetheless, alongside our common retrospectives on tech in 2024, the...

A four-pack of Apple AirTags is on sale for a report low of $70

For those who're continuously shedding your stuff, or know somebody who's, now's a good time to put money...

The Beats Studio Professional headphones are half off proper now

Beats up to date its high-end flagship wi-fi headphones final 12 months, bringing a slew of upgrades over...

Take a look at-driving Google’s Gemini-Exp-1206 mannequin in information evaluation, visualizations

Be part of our day by day and weekly newsletters for the most recent updates and unique content...