An Okta login bug bypassed checking passwords on some lengthy usernames

Date:

Share post:

Illustration by Cath Virginia / The Verge | Photograph from Getty Photos

On Friday night, Okta posted an odd replace to its record of safety advisories. The most recent entry reveals that underneath particular circumstances, somebody may’ve logged in by coming into something for a password, however provided that the account’s username had over 52 characters.

Based on the observe folks reported receiving, different necessities to take advantage of the vulnerability included Okta checking the cache from a earlier profitable login, and that a corporation’s authentication coverage didn’t add additional situations like requiring multi-factor authentication (MFA).

Listed below are the small print which might be at present out there:

On October 30, 2024, a vulnerability was internally recognized in producing the cache key for AD/LDAP DelAuth. The Bcrypt algorithm was…

Proceed studying…

Related articles

LG mounts planters on a lamp for residence rising

LG might have the earliest massive press convention of CES, however the Korean electronics large nonetheless can’t assist...

The 12 greatest devices we reviewed this 12 months

I've misplaced rely of the variety of issues we reviewed this 12 months at Engadget. In 2024, the...

CES 2025 ideas and tips: A information to tech’s greatest commerce present

Be part of our every day and weekly newsletters for the newest updates and unique content material on...

Easy methods to use Visible Intelligence, Apple’s tackle Google Lens

The current rollout of iOS 18.2 lastly brings most of the promised Apple Intelligence options, like Genmoji and...