CVE-2024-10327
Okta Verify iOS Push Notification Authentication Bypass
Description
A vulnerability in Okta Verify for iOS versions 9.25.1 (beta) and 9.27.0 (including beta) allows push notification responses through the iOS ContextExtension feature allowing the authentication to proceed regardless of the user’s selection. When a user long-presses the notification banner and selects an option, both options allow the authentication to succeed. The ContextExtension feature is one of several push mechanisms available when using Okta Verify Push on iOS devices. The vulnerable flows include: * When a user is presented with a notification on a locked screen, the user presses on the notification directly and selects their reply without unlocking the device; * When a user is presented with a notification on the home screen and drags the notification down and selects their reply; * When an Apple Watch is used to reply directly to a notification. A pre-condition for this vulnerability is that the user must have enrolled in Okta Verify while the Okta customer was using Okta Classic. This applies irrespective of whether the organization has since upgraded to Okta Identity Engine.
INFO
Published Date :
Oct. 24, 2024, 9:15 p.m.
Last Modified :
Oct. 25, 2024, 12:56 p.m.
Source :
[email protected]
Remotely Exploitable :
Yes !
Impact Score :
5.2
Exploitability Score :
2.8
Affected Products
The following products are affected by CVE-2024-10327
vulnerability.
Even if cvefeed.io
is aware of the exact versions of the
products
that
are
affected, the information is not represented in the table below.
No affected product recoded yet
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2024-10327
.
URL | Resource |
---|---|
https://help.okta.com/en-us/content/topics/releasenotes/okta-verify-release-notes.htm#panel2 | |
https://trust.okta.com/security-advisories/okta-verify-for-ios-cve-2024-10327/ |
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2024-10327
vulnerability anywhere in the article.
- Cybersecurity News
Google Chrome Enhances User Security with AI-Powered Website Reviews
Google Chrome is set to bolster online safety for users with the integration of a new AI-driven feature: “Store Reviews.” This functionality aims to provide users with a streamlined method for assessi ... Read more
- Cybersecurity News
XorBot Botnet Resurfaces with Advanced Evasion and Exploits, Threatens IoT Devices
NSFOCUS has identified a resurgence of the XorBot botnet, a potent threat to Internet of Things (IoT) devices worldwide. First observed in late 2023, XorBot has evolved significantly, introducing adva ... Read more
- Cybersecurity News
NVIDIA Base Command Manager Update Patches CVE-2024-0138 (CVSS 9.8)
NVIDIA has issued a critical security update for its Base Command Manager software, addressing a vulnerability that could open systems to a range of serious attacks. The flaw, tracked as CVE-2024-0138 ... Read more
- Cybersecurity News
CVE-2024-42450 (CVSS 10): Versa Networks Addresses Critical Vulnerability in Versa Director
Versa Networks has issued a security advisory addressing a critical vulnerability (CVE-2024-42450) affecting its Versa Director software. The vulnerability, which carries a CVSS score of 10, could all ... Read more
- Cybersecurity News
CVE-2024-21287: Critical Zero-Day Exploited in Oracle Agile PLM
Oracle has issued an urgent security alert regarding a critical vulnerability in its Agile Product Lifecycle Management (PLM) software, tracked as CVE-2024-21287. This flaw allows attackers to remotel ... Read more
- Cybersecurity News
2023’s Most Exploited Vulnerabilities: A Global Cybersecurity Advisory
In a joint cybersecurity advisory, the top cybersecurity agencies from the United States, Australia, Canada, New Zealand, and the United Kingdom have identified the most exploited vulnerabilities of 2 ... Read more
- Cybersecurity News
Fickle Stealer: The New Rust-Based Malware Masquerading as GitHub Desktop
Attack flow | Image: TrellixIn a recent report by Trellix researchers Mallikarjun Wali and Sangram Mohapatro, a new Rust-based malware called Fickle Stealer has surfaced, posing a significant threat t ... Read more
- Cybersecurity News
ZoneMinder’s CVE-2024-51482: A 10/10 Severity Vulnerability Exposes SQL Databases
A newly identified security vulnerability in ZoneMinder, a popular open-source video surveillance platform, could allow attackers to gain control over SQL databases, compromising data confidentiality ... Read more
- Cybersecurity News
MediaTek Security Bulletin Highlights High Severity Vulnerabilities in Mobile Chipsets
MediaTek, a leading global fabless semiconductor company, has issued a security bulletin disclosing multiple vulnerabilities across its chipset product line. These vulnerabilities impact a range of de ... Read more
- Cybersecurity News
CVE-2024-10327: Okta Verify for iOS Vulnerability Could Allow Unauthorized Access
A newly disclosed vulnerability in Okta Verify for iOS could allow unauthorized access to user accounts, even if the user actively denies the authentication request. The flaw, tracked as CVE-2024-1032 ... Read more
The following table lists the changes that have been made to the
CVE-2024-10327
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
CVE Received by [email protected]
Oct. 24, 2024
Action Type Old Value New Value Added Description A vulnerability in Okta Verify for iOS versions 9.25.1 (beta) and 9.27.0 (including beta) allows push notification responses through the iOS ContextExtension feature allowing the authentication to proceed regardless of the user’s selection. When a user long-presses the notification banner and selects an option, both options allow the authentication to succeed. The ContextExtension feature is one of several push mechanisms available when using Okta Verify Push on iOS devices. The vulnerable flows include: * When a user is presented with a notification on a locked screen, the user presses on the notification directly and selects their reply without unlocking the device; * When a user is presented with a notification on the home screen and drags the notification down and selects their reply; * When an Apple Watch is used to reply directly to a notification. A pre-condition for this vulnerability is that the user must have enrolled in Okta Verify while the Okta customer was using Okta Classic. This applies irrespective of whether the organization has since upgraded to Okta Identity Engine. Added Reference Okta https://trust.okta.com/security-advisories/okta-verify-for-ios-cve-2024-10327/ [No types assigned] Added Reference Okta https://help.okta.com/en-us/content/topics/releasenotes/okta-verify-release-notes.htm#panel2 [No types assigned] Added CWE Okta CWE-287 Added CVSS V3.1 Okta AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2024-10327
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2024-10327
weaknesses.