CVE-2022-24584

Incorrect access control in Yubico OTP functionality of the YubiKey hardware tokens along with the Yubico OTP validation server. The Yubico OTP supposedly creates hardware bound second factor credentials. When a user reprograms the OTP functionality by "writing" it on a token using the Yubico Personalization Tool, they can then upload the new configuration to Yubicos OTP validation servers. NOTE: the vendor disputes this because there is no way for a YubiKey device to prevent a user from deciding that a secret value, which is imported into the device, should also be stored elsewhere
References
Link Resource
https://demo.yubico.com/otp/verify Vendor Advisory
https://pastebin.com/7iLR1EbW Exploit Third Party Advisory
https://pastebin.com/xAh8uV6J Third Party Advisory
https://upload.yubico.com/ Vendor Advisory
https://demo.yubico.com/otp/verify Vendor Advisory
https://pastebin.com/7iLR1EbW Exploit Third Party Advisory
https://pastebin.com/xAh8uV6J Third Party Advisory
https://upload.yubico.com/ Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:yubico:otp:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:50

Type Values Removed Values Added
References () https://demo.yubico.com/otp/verify - Vendor Advisory () https://demo.yubico.com/otp/verify - Vendor Advisory
References () https://pastebin.com/7iLR1EbW - Exploit, Third Party Advisory () https://pastebin.com/7iLR1EbW - Exploit, Third Party Advisory
References () https://pastebin.com/xAh8uV6J - Third Party Advisory () https://pastebin.com/xAh8uV6J - Third Party Advisory
References () https://upload.yubico.com/ - Vendor Advisory () https://upload.yubico.com/ - Vendor Advisory

07 Nov 2023, 03:44

Type Values Removed Values Added
Summary ** DISPUTED ** Incorrect access control in Yubico OTP functionality of the YubiKey hardware tokens along with the Yubico OTP validation server. The Yubico OTP supposedly creates hardware bound second factor credentials. When a user reprograms the OTP functionality by "writing" it on a token using the Yubico Personalization Tool, they can then upload the new configuration to Yubicos OTP validation servers. NOTE: the vendor disputes this because there is no way for a YubiKey device to prevent a user from deciding that a secret value, which is imported into the device, should also be stored elsewhere. Incorrect access control in Yubico OTP functionality of the YubiKey hardware tokens along with the Yubico OTP validation server. The Yubico OTP supposedly creates hardware bound second factor credentials. When a user reprograms the OTP functionality by "writing" it on a token using the Yubico Personalization Tool, they can then upload the new configuration to Yubicos OTP validation servers. NOTE: the vendor disputes this because there is no way for a YubiKey device to prevent a user from deciding that a secret value, which is imported into the device, should also be stored elsewhere

Information

Published : 2022-05-11 18:15

Updated : 2024-11-21 06:50


NVD link : CVE-2022-24584

Mitre link : CVE-2022-24584

CVE.ORG link : CVE-2022-24584


JSON object : View

Products Affected

yubico

  • otp
CWE
CWE-863

Incorrect Authorization