Authenticator is a browser extensions that generates two-step verification codes. In versions 7.0.0 and below, encryption keys for user data were stored encrypted at-rest using only AES-256 and the EVP_BytesToKey KDF. Therefore, attackers with a copy of a user's data are able to brute-force the user's encryption key. Users on version 8.0.0 and above are automatically migrated away from the weak encoding on first login. Users should destroy encrypted backups made with versions prior to 8.0.0.
History

Tue, 17 Sep 2024 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Authenticator
Authenticator authenticator
Weaknesses CWE-326
CPEs cpe:2.3:a:authenticator:authenticator:*:*:*:*:*:*:*:*
Vendors & Products Authenticator
Authenticator authenticator

Tue, 03 Sep 2024 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Authenticator-extension
Authenticator-extension authenticator
CPEs cpe:2.3:a:authenticator-extension:authenticator:*:*:*:*:*:*:*:*
Vendors & Products Authenticator-extension
Authenticator-extension authenticator
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 03 Sep 2024 20:30:00 +0000

Type Values Removed Values Added
Description Authenticator is a browser extensions that generates two-step verification codes. In versions 7.0.0 and below, encryption keys for user data were stored encrypted at-rest using only AES-256 and the EVP_BytesToKey KDF. Therefore, attackers with a copy of a user's data are able to brute-force the user's encryption key. Users on version 8.0.0 and above are automatically migrated away from the weak encoding on first login. Users should destroy encrypted backups made with versions prior to 8.0.0.
Title Secret encryption vulnerable to brute-force attacks
Weaknesses CWE-261
CWE-327
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-09-03T20:15:42.769Z

Updated: 2024-09-03T20:49:37.246Z

Reserved: 2024-08-28T20:21:32.802Z

Link: CVE-2024-45394

cve-icon Vulnrichment

Updated: 2024-09-03T20:49:30.657Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-03T21:15:16.350

Modified: 2024-09-17T13:26:42.567

Link: CVE-2024-45394

cve-icon Redhat

No data.