In the Twilio Authy API, accessed by Authy Android before 25.1.0 and Authy iOS before 26.1.0, an unauthenticated endpoint provided access to certain phone-number data, as exploited in the wild in June 2024. Specifically, the endpoint accepted a stream of requests containing phone numbers, and responded with information about whether each phone number was registered with Authy. (Authy accounts were not compromised, however.)
References
Link | Resource |
---|---|
https://cwe.mitre.org/data/definitions/203.html | Technical Description |
https://www.bleepingcomputer.com/news/security/hackers-abused-api-to-verify-millions-of-authy-mfa-phone-numbers/ | Press/Media Coverage |
https://www.twilio.com/docs/usage/security/reporting-vulnerabilities | Product |
https://www.twilio.com/en-us/changelog | Product Release Notes |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-07-02 18:15
Updated : 2024-07-24 14:38
NVD link : CVE-2024-39891
Mitre link : CVE-2024-39891
CVE.ORG link : CVE-2024-39891
JSON object : View
Products Affected
twilio
- authy_authenticator
- authy
CWE
CWE-203
Observable Discrepancy