Brute Force Affecting github.com/zitadel/zitadel/internal/command package, versions <2.50.0-rc.1
Threat Intelligence
EPSS
0.04% (11th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-GOLANG-GITHUBCOMZITADELZITADELINTERNALCOMMAND-6674158
- published 26 Apr 2024
- disclosed 25 Apr 2024
- credit Jack Moran, Ethan, Amit Laish
Introduced: 25 Apr 2024
CVE-2024-32868 Open this link in a new tabHow to fix?
Upgrade github.com/zitadel/zitadel/internal/command
to version 2.50.0-rc.1 or higher.
Overview
Affected versions of this package are vulnerable to Brute Force due to the lack of a lockout mechanism for Time-based One-Time-Password (TOTP) and One-Time-Password (OTP) checks. An attacker can bypass Multi-Factor Authentication (MFA) by repeatedly attempting to authenticate with incorrect (T)OTP values without triggering a lockout condition.
References
CVSS Scores
version 3.1