Connect with us

Hi, what are you looking for?

Webinar News NetworkWebinar News Network

Tech News

An Okta login bug bypassed checking passwords on some long usernames

Illustration of a password above an open combination lock, implying a data breach.
Illustration by Cath Virginia / The Verge | Photo from Getty Images

On Friday evening, Okta posted an odd update to its list of security advisories. The latest entry reveals that under specific circumstances, someone could’ve logged in by entering anything for a password, but only if the account’s username had over 52 characters.

According to the note people reported receiving, other requirements to exploit the vulnerability included Okta checking the cache from a previous successful login, and that an organization’s authentication policy didn’t add extra conditions like requiring multi-factor authentication (MFA).

Here are the details that are currently available:

On October 30, 2024, a vulnerability was internally identified in generating the cache key for AD/LDAP DelAuth. The Bcrypt algorithm was…

Continue reading…

You May Also Like

Editor's Pick

Jennifer J. Schulp and Jack Solowey What do Yankees tickets and Pokémon cards have in common? If you guessed wish list items for elementary...

Editor's Pick

James A. Dorn In her recent article in Business Insider, Linette Lopez, a graduate of the School of Journalism at Columbia University, argues that China’s...

Editor's Pick

Colleen Hroncich Nicholas Ellis wants to tell a different story about what it means to flourish. “What does it mean to win at life...

Editor's Pick

S&P 500 earnings are in for 2024 Q2, and here is our valuation analysis. The following chart shows the normal value range of the...