Illustration by Cath Virginia / The Verge | Photo from Getty Images
On Friday evening, Okta posted an odd update to its list of security advisories. The latest entry reveals that under specific circumstances, someone could’ve logged in by entering anything for a password, but only if the account’s username had over 52 characters.
According to the note people reported receiving, other requirements to exploit the vulnerability included Okta checking the cache from a previous successful login, and that an organization’s authentication policy didn’t add extra conditions like requiring multi-factor authentication (MFA).
Here are the details that are currently available:
On October 30, 2024, a vulnerability was internally identified in generating the cache key for AD/LDAP DelAuth. The Bcrypt algorithm was...
Continue reading…
Sign in to continue to Global Noticeboard
Enter your email to receive a reset link
Create a new password for your account
You are marking this Notice are inappropriate, and you belive it infringes on the Global Noticeboard Community Guidelines (link). Is this so?
Create 3 Noticeboards to earn this Silver level Community Champion Badge.
View all badges that you can earnPlease tell us why you are reporting this content.