Multifactor authentication bypass in Okta Verify for iOS



Published: 2024-10-25
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2024-10327
CWE-ID CWE-254
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Okta Verify for iOS
Mobile applications / Apps for mobile phones

Vendor

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Security features bypass

EUVDB-ID: #VU99354

Risk: Medium

CVSSv3.1: 6.7 [CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-10327

CWE-ID: CWE-254 - Security Features

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass multifactor authentication.

The vulnerability exists due to the application allows push notification responses through the iOS ContextExtension feature, which leads to the victim confirming the authentication request regardless of the option selection. When a user long-presses the notification banner and selects an option, both options allow the authentication to succeed. A remote attacker with knowledge of the victim's password (or with ability to perform password spraying attack) can bypass second factor authentication and gain unauthorized access to the application protected with Okta Verify.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Okta Verify for iOS: before 9.27.2

CPE2.3
External links

http://trust.okta.com/security-advisories/okta-verify-for-ios-cve-2024-10327


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###