Vulnerability CVE-2020-10185


Published: 2020-03-05   Modified: 2020-03-06

Description:
The sync endpoint in YubiKey Validation Server before 2.40 allows remote attackers to replay an OTP. NOTE: this issue is potentially relevant to persons outside Yubico who operate a self-hosted OTP validation service with a non-default configuration such as an open sync pool; the issue does NOT affect YubiCloud.

Type:

CWE-294

(Authentication Bypass by Capture-replay)

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
6.4/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Yubico -> Yubikey one time password validation server 

 References:
https://github.com/Yubico/yubikey-val/releases/tag/yubikey-val-2.40
https://lists.debian.org/debian-lts-announce/2020/03/msg00014.html
https://www.yubico.com/support/security-advisories/ysa-2020-01/

Copyright 2024, cxsecurity.com

 

Back to Top