Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-32868
HistoryApr 25, 2024 - 11:53 p.m.

CVE-2024-32868 ZITADEL's Improper Lockout Mechanism Leads to MFA Bypass

2024-04-2523:53:37
CWE-307
CWE-297
GitHub_M
github.com
3
zitadel
improper lockout mechanism
mfa bypass
totp
otp
sms
email
lockout policy
patched
version 2.50.0

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

6.9

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

ZITADEL provides users the possibility to use Time-based One-Time-Password (TOTP) and One-Time-Password (OTP) through SMS and Email. While ZITADEL already gives administrators the option to define a Lockout Policy with a maximum amount of failed password check attempts, there was no such mechanism for (T)OTP checks. This issue has been patched in version 2.50.0.

CNA Affected

[
  {
    "vendor": "zitadel",
    "product": "zitadel",
    "versions": [
      {
        "status": "affected",
        "version": "< 2.50.0"
      }
    ]
  }
]

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

6.9

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-32868