On Friday night, Okta posted an odd replace to its checklist of safety advisories. The most recent entry reveals that below particular circumstances, somebody may’ve logged in by coming into something for a password, however provided that the account’s username had over 52 characters.
In keeping with the be aware folks reported receiving, different necessities to take advantage of the vulnerability included Okta checking the cache from a earlier profitable login, and that a company’s authentication coverage didn’t add further situations like requiring multi-factor authentication (MFA).
Listed here are the main points which can be at the moment obtainable:
On October 30, 2024, a vulnerability was internally recognized in producing the cache key for AD/LDAP DelAuth. The Bcrypt algorithm was…
Proceed studying…