2 results (0.003 seconds)

CVSS: 5.3EPSS: 20%CPEs: 2EXPL: 0

In the Twilio Authy API, accessed by Authy Android before 25.1.0 and Authy iOS before 26.1.0, an unauthenticated endpoint provided access to certain phone-number data, as exploited in the wild in June 2024. Specifically, the endpoint accepted a stream of requests containing phone numbers, and responded with information about whether each phone number was registered with Authy. (Authy accounts were not compromised, however.) En la API de Twilio Authy, a la que accedía Authy Android antes de 25.1.0 y Authy iOS antes de 26.1.0, un endpoint no autenticado proporcionaba acceso a ciertos datos de números de teléfono. (Sin embargo, las cuentas de Authy no se vieron comprometidas). • https://cwe.mitre.org/data/definitions/203.html https://www.bleepingcomputer.com/news/security/hackers-abused-api-to-verify-millions-of-authy-mfa-phone-numbers https://www.twilio.com/docs/usage/security/reporting-vulnerabilities https://www.twilio.com/en-us/changelog • CWE-203: Observable Discrepancy •

CVSS: 5.1EPSS: 0%CPEs: 1EXPL: 0

A race condition in the Twilio Authy 2-Factor Authentication application before 24.3.7 for Android allows a user to potentially approve/deny an access request prior to unlocking the application with a PIN on older Android devices (effectively bypassing the PIN requirement). Una condición de carrera en la aplicación Twilio Authy 2-Factor Authentication versiones anteriores a 24.3.7 para Android, permite a un usuario aprobar y denegar potencialmente una petición de acceso antes de desbloquear la aplicación con un PIN en dispositivos Android más antiguos (omitiendo efectivamente el requisito del PIN) • https://www.twilio.com/changelog • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •