No menu items!

    An Okta login bug bypassed checking passwords on some lengthy usernames

    Date:

    Share post:

    Illustration by Cath Virginia / The Verge | Photograph from Getty Photographs

    On Friday night, Okta posted an odd replace to its checklist of safety advisories. The newest entry reveals that below particular circumstances, somebody might’ve logged in by coming into something for a password, however provided that the account’s username had over 52 characters.

    In accordance with the observe individuals reported receiving, different necessities to take advantage of the vulnerability included Okta checking the cache from a earlier profitable login, and that a company’s authentication coverage didn’t add further circumstances like requiring multi-factor authentication (MFA).

    Listed here are the small print which can be at the moment accessible:

    On October 30, 2024, a vulnerability was internally recognized in producing the cache key for AD/LDAP DelAuth. The Bcrypt algorithm was…

    Proceed studying…

    Related articles

    Hugging Face brings ‘Pi-Zero’ to LeRobot, making AI-powered robots simpler to construct and deploy

    Be a part of our each day and weekly newsletters for the most recent updates and unique content...

    Pour one out for Cruise and why autonomous automobile check miles dropped 50%

    Welcome again to TechCrunch Mobility — your central hub for information and insights on the way forward for...

    Anker’s newest charger and energy financial institution are again on sale for record-low costs

    Anker made numerous bulletins at CES 2025, together with new chargers and energy banks. We noticed a few...

    GitHub Copilot previews agent mode as marketplace for agentic AI coding instruments accelerates

    Be a part of our day by day and weekly newsletters for the newest updates and unique content...