In the Twilio Authy API, accessed by Authy Android before 25.1.0 and Authy iOS before 26.1.0, an unauthenticated endpoint provided access to certain phone-number data, as exploited in the wild in June 2024. Specifically, the endpoint accepted a stream of requests containing phone numbers, and responded with information about whether each phone number was registered with Authy. (Authy accounts were not compromised, however.)
References
Link | Resource |
---|---|
https://cwe.mitre.org/data/definitions/203.html | Technical Description |
https://www.bleepingcomputer.com/news/security/hackers-abused-api-to-verify-millions-of-authy-mfa-phone-numbers/ | Press/Media Coverage |
https://www.twilio.com/docs/usage/security/reporting-vulnerabilities | Product |
https://www.twilio.com/en-us/changelog | Product Release Notes |
https://cwe.mitre.org/data/definitions/203.html | Technical Description |
https://www.bleepingcomputer.com/news/security/hackers-abused-api-to-verify-millions-of-authy-mfa-phone-numbers/ | Press/Media Coverage |
https://www.twilio.com/docs/usage/security/reporting-vulnerabilities | Product |
https://www.twilio.com/en-us/changelog | Product Release Notes |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 09:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://cwe.mitre.org/data/definitions/203.html - Technical Description | |
References | () https://www.bleepingcomputer.com/news/security/hackers-abused-api-to-verify-millions-of-authy-mfa-phone-numbers/ - Press/Media Coverage | |
References | () https://www.twilio.com/docs/usage/security/reporting-vulnerabilities - Product | |
References | () https://www.twilio.com/en-us/changelog - Product, Release Notes | |
Summary | (es) En la API de Twilio Authy, a la que accedían Authy Android antes de la versión 25.1.0 y Authy iOS antes de la versión 26.1.0, un endpoint no autenticado proporcionaba acceso a determinados datos de números de teléfono, como se explotó en junio de 2024. En concreto, el endpoint aceptaba un flujo de solicitudes que contenían números de teléfono y respondía con información sobre si cada número de teléfono estaba registrado en Authy. (Sin embargo, las cuentas de Authy no se vieron comprometidas). |
24 Jul 2024, 14:38
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:twilio:authy:*:*:*:*:*:iphone_os:*:* cpe:2.3:a:twilio:authy_authenticator:*:*:*:*:*:android:*:* |
|
First Time |
Twilio
Twilio authy Twilio authy Authenticator |
|
References | () https://cwe.mitre.org/data/definitions/203.html - Technical Description | |
References | () https://www.bleepingcomputer.com/news/security/hackers-abused-api-to-verify-millions-of-authy-mfa-phone-numbers/ - Press/Media Coverage | |
References | () https://www.twilio.com/docs/usage/security/reporting-vulnerabilities - Product | |
References | () https://www.twilio.com/en-us/changelog - Product, Release Notes |
03 Jul 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | (en) In the Twilio Authy API, accessed by Authy Android before 25.1.0 and Authy iOS before 26.1.0, an unauthenticated endpoint provided access to certain phone-number data, as exploited in the wild in June 2024. Specifically, the endpoint accepted a stream of requests containing phone numbers, and responded with information about whether each phone number was registered with Authy. (Authy accounts were not compromised, however.) |
03 Jul 2024, 12:53
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
03 Jul 2024, 02:05
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-203 |
02 Jul 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-02 18:15
Updated : 2024-11-21 09:28
NVD link : CVE-2024-39891
Mitre link : CVE-2024-39891
CVE.ORG link : CVE-2024-39891
JSON object : View
Products Affected
twilio
- authy
- authy_authenticator
CWE
CWE-203
Observable Discrepancy