CVE-2024-39891
Twilio
CVE-2024-39891: Unauthenticated access to phone number data in Twilio Authy API. This vulnerability in the Twilio Authy API allowed unauthorized access to phone number registration data, impacting Authy Android versions before 25.1.0 and Authy iOS versions before 26.1.0. The unauthenticated endpoint permitted the querying of phone numbers to determine if they were registered with Authy. While Authy accounts were not compromised, the exposure of this information poses significant privacy risks. The vulnerability, actively exploited in the wild as of June 2024, highlights the need for robust API security. With a SOCRadar Vulnerability Risk Score (SVRS) of 52, indicating a moderate risk, organizations should assess potential exposure and prioritize updates. Although the CVSS score is 5.3, the "In The Wild" tag suggests immediate patching, as active exploits exist. This information disclosure vulnerability underscores the importance of secure API design and continuous monitoring for potential threats.
Description:
CVE-2024-39891 is a vulnerability in the Twilio Authy API that allowed unauthenticated access to certain phone-number data. This vulnerability could have been exploited by attackers to gather sensitive information about users, such as their phone numbers and associated accounts.
Key Insights:
- The SVRS of 34 indicates that this vulnerability is of moderate severity and requires attention.
- The vulnerability was present in Authy Android versions before 25.1.0 and Authy iOS versions before 26.1.0.
- While Authy accounts were not compromised, attackers could have used the exposed data to launch phishing or other targeted attacks.
Mitigation Strategies:
- Update Authy Android to version 25.1.0 or later.
- Update Authy iOS to version 26.1.0 or later.
- Implement strong authentication measures to protect user accounts.
- Monitor for suspicious activity and take appropriate action if necessary.
Additional Information:
- There are no known active exploits for this vulnerability.
- CISA has not issued a warning for this vulnerability.
- The vulnerability is not currently being exploited in the wild.
If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.