An Okta login bug bypassed checking passwords on some lengthy usernames

Date:


Illustration by Cath Virginia / The Verge | Photograph from Getty Pictures

On Friday night, Okta posted an odd replace to its checklist of safety advisories. The most recent entry reveals that beneath particular circumstances, somebody might’ve logged in by getting into something for a password, however provided that the account’s username had over 52 characters.

In line with the notice folks reported receiving, different necessities to use the vulnerability included Okta checking the cache from a earlier profitable login, and that a corporation’s authentication coverage didn’t add additional situations like requiring multi-factor authentication (MFA).

Listed below are the small print which are at the moment out there:

On October 30, 2024, a vulnerability was internally recognized in producing the cache key for AD/LDAP DelAuth. The Bcrypt algorithm was…

Proceed studying…



Supply hyperlink

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Share post:

Popular

More like this

Instantaneous Inflation | Econbrowser

Headline up, core down.   Determine 1: Instantaneous inflation per...

Most cancers charges in ladies below 50 are rising

© 2024 Fortune Media IP Restricted. All Rights...

Why 2025 Appears to be like ‘Harmful’ for the US-China Relationship

From Taiwan to the South China Sea to...

UK economic system’s 0.1% progress fails to hit forecasts

Unlock the Editor’s Digest free of chargeRoula Khalaf,...