CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
EPSS
Percentile
30.8%
Improper signature counter value handling
A flaw was found in webauthn4j-spring-security-core. When an authneticator returns an incremented signature counter value during authentication, webauthn4j-spring-security-core does not properly persist the value, which means cloned authenticator detection does not work.
An attacker who cloned valid authenticator in some way can use the cloned authenticator without being detected.
Please upgrade to com.webauthn4j:webauthn4j-spring-security-core:0.9.1.RELEASE
For more details about WebAuthn signature counters, see WebAuthn specification 6.1.1. Signature Counter Considerations.
This issue was discovered by Michael Budnick (@mbudnick)
github.com/webauthn4j/webauthn4j-spring-security
github.com/webauthn4j/webauthn4j-spring-security/commit/129700d74d83f9b9a82bf88ebc63707e3cb0a725
github.com/webauthn4j/webauthn4j-spring-security/security/advisories/GHSA-v9hx-v6vf-g36j
nvd.nist.gov/vuln/detail/CVE-2023-45669
www.w3.org/TR/2021/REC-webauthn-2-20210408/#sctn-sign-counter