Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-24584: CVE-2022-24584: Incorrect access control in Yubico OTP functionality of the Yu b - Pastebin.com

Incorrect access control in Yubico OTP functionality of the YubiKey hardware tokens along with the Yubico OTP validation server. The Yubico OTP supposedly creates hardware bound second factor credentials. When a user reprograms the OTP functionality by “writing” it on a token using the Yubico Personalization Tool, they can then upload the new configuration to Yubicos OTP validation servers.

CVE
#vulnerability#mac#pdf
  1. CVE-2022-24584: Incorrect access control in Yubico OTP functionality of the Yu bi Key hardware tokens along with the Yubico OTP validation server
  1. https://boards.4channel.org/g/thread/86801252

  2. https://i.4cdn.org/g/1651680877341.jpg

  3. https://anonfiles.com/Tav0bddby7/CVE-2022-24584_pdf

  4. https://cdn-130.anonfiles.com/Tav0bddby7/3602e604-1651679466/CVE-2022-24584.pdf

  5. https://anonfiles.com/Ddk0d4d7y7/yubico_zip

  6. https://cdn-104.anonfiles.com/Ddk0d4d7y7/9f80ed64-1651685867/yubico.zip

  1. All links are included in the Internet Archive/Wayback Machine

  2. Screenshots for Proof of Vulnerability are included as attachments in the PDF.

  1. Hello,
  1. I am writing to you to report a security vulnerability in the Yubico OTP Validation Server. I assess the

  2. severity NOT to be High, mostly because Yubico OTP isn’t as widely used as the alternatives, such as U2f,

  3. FIDO etc., but regardless I believe it must be published and an advisory issued.

  1. The product claims made on the product page state that the Yubico OTPs are hardware bound and

  2. unclonable. This might be correct AFTER the configuration has been written to the device. But, someone

  3. could make a duplicate device using the same configuration. After reprogramming, the new

  4. configuration will have to be uploaded to the Yubico servers. I have shown that the server will accept

  5. any uploaded configuration and, even though the upload form asks for the serial number, it is not

  6. utilized to make sure that the configuration is actually bound to a particular device.

  1. The conclusion is that only OTPs starting with “cc” are hardware bound, since they are programmed at

  2. the factory. In the case where the customer wants to program custom secrets, the new configuration

  3. uploaded to the Yubico server (OTPs starting with “vv”) are not hardware bound and the serial number

  4. isn’t checked.

  1. I have already applied for a CVE ID (CVE-2022-24584) but haven’t otherwise publicized these findings

  2. and I leave it to you.

  1. Thank you,

  2. [REDACTED]

Related news

CVE-2022-22413: IBM Robotic Process Automation SQL injection CVE-2022-22413 Vulnerability Report

IBM Robotic Process Automation 21.0.0, 21.0.1, and 21.0.2 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 223022.

CVE-2022-24584: CVE-2022-24584: Incorrect access control in Yubico OTP functionality of the Yu b - Pastebin.com

Incorrect access control in Yubico OTP functionality of the YubiKey hardware tokens along with the Yubico OTP validation server. The Yubico OTP supposedly creates hardware bound second factor credentials. When a user reprograms the OTP functionality by "writing" it on a token using the Yubico Personalization Tool, they can then upload the new configuration to Yubicos OTP validation servers.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907