FacebookInstagramTwitterContact

 

You C-1000 Basketball Cup           >>           Brunei Youth League U18           >>           Lela Cheteria League           >>           Water Tank Cleaning Works           >>           Doa Kesyukuran Ceremony           >>           Major Responsibility in Realising Wawasan Brunei 2035           >>           Seminar in Conjunctions With CIPTA 2025           >>           Appointment Letters for Mosque Takmir Committee Presentation           >>           igning of MoU with Cadi Ayyad University of Morocco           >>           Signing of MoU           >>          

 

SHARE THIS ARTICLE




REACH US


GENERAL INQUIRY

[email protected]

 

ADVERTISING

[email protected]

 

PRESS RELEASE

[email protected]

 

HOTLINE

+673 222-0178 [Office Hour]

+673 223-6740 [Fax]

 



Upcoming Events





Prayer Times


The prayer times for Brunei-Muara and Temburong districts. For Tutong add 1 minute and for Belait add 3 minutes.


Imsak

: 04:34 AM

Subuh

: 04:44 AM

Syuruk

: 06:09 AM

Doha

: 06:33 AM

Zohor

: 12:22 PM

Asar

: 03:48 PM

Maghrib

: 06:34 PM

Isyak

: 07:49 PM

 



The Business Directory


 

 



Internet & Media


  Home > Internet & Media


Okta Vulnerability Allowed Accounts With Long Usernames To Log In Without A Password


Westend61 via Getty Images

 


 November 5th, 2024  |  01:17 AM  |   596 views

ENGADGET

 

The company has fixed the issue, three months after an update introduced it.

 

In a new security advisory, Okta has revealed that its system had a vulnerability that allowed people to log into an account without having to provide the correct password. Okta bypassed password authentication if the account had a username that had 52 or more characters. Further, its system had to detect a "stored cache key" of a previous successful authentication, which means the account's owner had to have previous history of logging in using that browser. It also didn't affect organizations that require multi-factor authentication, according to the notice the company sent to its users.

 

Still, a 52-character username is easier to guess than a random password — it could be as simple as a person's email address that has their full name along with their organization's website domain. The company has admitted that the vulnerability was introduced as part of a standard update that went out on July 23, 2024 and that it only discovered (and fixed) the issue on October 30. It's now advising customers who meet all of the vulnerability's conditions to check their access log over the past few months.

 

Okta provides software that makes it easy for companies to add authentication services to their application. For organizations with multiple apps, it gives users access to a single, unified log-in so they don't have to verify their identities for each application. The company didn't say whether it's aware of anybody who's been affected by this specific issue, but it promised to "communicate more rapidly with customers" in the past after the threat group Lapsus$ accessed a couple of users' accounts.

 


 

Source:
courtesy of ENGADGET

by Mariella Moon

 

If you have any stories or news that you would like to share with the global online community, please feel free to share it with us by contacting us directly at [email protected]

 

Related News


Lahad Datu Murder: Remand Of 13 Students Extende

 2024-03-30 07:57:54

How Trump's Tariff Chaos Could Reshape Asia's Businesses

 2025-07-07 10:22:30

Crying At Work: A Sign Of Strength, Weakness Or Just Being Human?

 2025-07-06 01:39:58