CVE-2024-45394
03.09.2024, 21:15
Authenticator is a browser extension that generates two-step verification codes. In versions 7.0.0 and below, encryption keys for user data were stored encrypted at-rest using only AES-256 and the EVP_BytesToKey KDF. Therefore, attackers with a copy of a user's data are able to brute-force the user's encryption key. Users on version 8.0.0 and above are automatically migrated away from the weak encoding on first login. Users should destroy encrypted backups made with versions prior to 8.0.0.Enginsight
Vendor | Product | Version |
---|---|---|
authenticator | authenticator | 𝑥 < 8.0.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-261 - Weak Encoding for PasswordObscuring a password with a trivial encoding does not protect the password.
- CWE-326 - Inadequate Encryption StrengthThe software stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.