Connect with us

Hi, what are you looking for?

Brilliant AchievementBrilliant Achievement

Tech News

An Okta login bug bypassed checking passwords on some long usernames

Illustration of a password above an open combination lock, implying a data breach.
Illustration by Cath Virginia / The Verge | Photo from Getty Images

On Friday evening, Okta posted an odd update to its list of security advisories. The latest entry reveals that under specific circumstances, someone could’ve logged in by entering anything for a password, but only if the account’s username had over 52 characters.

According to the note people reported receiving, other requirements to exploit the vulnerability included Okta checking the cache from a previous successful login, and that an organization’s authentication policy didn’t add extra conditions like requiring multi-factor authentication (MFA).

Here are the details that are currently available:

On October 30, 2024, a vulnerability was internally identified in generating the cache key for AD/LDAP DelAuth. The Bcrypt algorithm was…

Continue reading…

Join The Exclusive Subscription Today And Get Premium Articles For Free
Your information is secure and your privacy is protected. By opting in you agree to receive emails from us. Remember that you can opt-out any time, we hate spam too!

You May Also Like

Editor's Pick

Thomas A. Berry and Alexander Khoury Since the creation of the market square, there have been boisterous, loquacious individuals who have solicited bids for...

Tech News

Illustration by Laura Normand / The Verge The Presidential campaign of Donald Trump asked X to stop links to a story containing VP nominee...

Editor's Pick

Eric Gomez and Benjamin Giltner There were multiple developments in US security assistance to Taiwan in September 2024, but the size of the arms...

Tech News

Image: Ford Ford announced today that it would be working with bike company N plus to introduce two new e-bikes inspired by the automaker’s...