#VU99354 Security features bypass in Okta Verify for iOS


Published: 2024-10-25

Vulnerability identifier: #VU99354

Vulnerability risk: Medium

CVSSv3.1: 6.7 [CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-10327

CWE-ID: CWE-254

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Okta Verify for iOS
Mobile applications / Apps for mobile phones

Vendor:

Description

The vulnerability allows a remote attacker to bypass multifactor authentication.

The vulnerability exists due to the application allows push notification responses through the iOS ContextExtension feature, which leads to the victim confirming the authentication request regardless of the option selection. When a user long-presses the notification banner and selects an option, both options allow the authentication to succeed. A remote attacker with knowledge of the victim's password (or with ability to perform password spraying attack) can bypass second factor authentication and gain unauthorized access to the application protected with Okta Verify.

Mitigation
Install updates from vendor's website.

Vulnerable software versions


External links
http://trust.okta.com/security-advisories/okta-verify-for-ios-cve-2024-10327


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability