Home Tech News An Okta login bug bypassed checking passwords on some long usernames

An Okta login bug bypassed checking passwords on some long usernames

by Admin
0 comment
Illustration of a password above an open combination lock, implying a data breach.
Illustration by Cath Virginia / The Verge | Picture from Getty Photographs

On Friday night, Okta posted an odd replace to its record of safety advisories. The most recent entry reveals that underneath particular circumstances, somebody might’ve logged in by coming into something for a password, however provided that the account’s username had over 52 characters.

In line with the be aware folks reported receiving, different necessities to use the vulnerability included Okta checking the cache from a earlier profitable login, and that a company’s authentication coverage didn’t add further circumstances like requiring multi-factor authentication (MFA).

Listed here are the small print which are at the moment obtainable:

On October 30, 2024, a vulnerability was internally recognized in producing the cache key for AD/LDAP DelAuth. The Bcrypt algorithm was…

Proceed studying…

You Might Be Interested In
See also  The intersection of AI and crypto and its potential to solve Ethereum’s bug issue

Source link

You may also like

cbn (2)

Discover the latest in tech and cyber news. Stay informed on cybersecurity threats, innovations, and industry trends with our comprehensive coverage. Dive into the ever-evolving world of technology with us.

© 2024 cyberbeatnews.com – All Rights Reserved.