CVE-2023-44039

In VeridiumID before 3.5.0, the WebAuthn API allows an internal unauthenticated attacker (who can pass enrollment verifications and is allowed to enroll a FIDO key) to register their FIDO authenticator to a victim’s account and consequently take over the account.
Configurations

No configuration.

History

21 Nov 2024, 08:25

Type Values Removed Values Added
References () https://docs.veridiumid.com/docs/v3.5/security-advisory#id-%28v3.52%29SecurityAdvisory-Acknowledgement - () https://docs.veridiumid.com/docs/v3.5/security-advisory#id-%28v3.52%29SecurityAdvisory-Acknowledgement -
References () https://veridiumid.com/veridium-id-authentication-platform/ - () https://veridiumid.com/veridium-id-authentication-platform/ -

21 Aug 2024, 21:35

Type Values Removed Values Added
CWE CWE-287
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1
Summary
  • (es) En VeridiumID anterior a 3.5.0, la API WebAuthn permite que un atacante interno no autenticado (que puede pasar verificaciones de inscripción y puede registrar una clave FIDO) registre su autenticador FIDO en la cuenta de una víctima y, en consecuencia, se haga cargo de la cuenta.

03 Apr 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-03 16:15

Updated : 2024-11-21 08:25


NVD link : CVE-2023-44039

Mitre link : CVE-2023-44039

CVE.ORG link : CVE-2023-44039


JSON object : View

Products Affected

No product.

CWE
CWE-287

Improper Authentication