#VU99354 Security features bypass in Okta Verify for iOS - CVE-2024-10327


Vulnerability identifier: #VU99354

Vulnerability risk: Medium

CVSSv4.0: 4.1 [CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2024-10327

CWE-ID: CWE-254

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Okta Verify for iOS
Mobile applications / Apps for mobile phones

Vendor: Okta

Description

The vulnerability allows a remote attacker to bypass multifactor authentication.

The vulnerability exists due to the application allows push notification responses through the iOS ContextExtension feature, which leads to the victim confirming the authentication request regardless of the option selection. When a user long-presses the notification banner and selects an option, both options allow the authentication to succeed. A remote attacker with knowledge of the victim's password (or with ability to perform password spraying attack) can bypass second factor authentication and gain unauthorized access to the application protected with Okta Verify.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Okta Verify for iOS: before 9.27.2


External links
https://trust.okta.com/security-advisories/okta-verify-for-ios-cve-2024-10327


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability