On Friday night, Okta posted a wierd replace to its safety advisory record. The most recent entry exhibits that below sure circumstances somebody may have logged in by coming into something for a password, however provided that the account's username was longer than 52 characters.
In line with the memo individuals reported receiving, different necessities for exploiting the vulnerability included checking Okta's cache from a earlier profitable login and that a corporation's authentication coverage didn’t add circumstances further, corresponding to the necessity for multi-factor authentication (MFA).
Listed here are the small print at present out there:
On October 30, 2024, a vulnerability was internally recognized in AD/LDAP DelAuth cache key technology. The Bcrypt algorithm was…
Proceed studying…