CVE-2024-39891
NixOS vulnerability analysis and mitigation

Overview

In the Twilio Authy API, accessed by Authy Android before 25.1.0 and Authy iOS before 26.1.0, an unauthenticated endpoint provided access to certain phone-number data, as exploited in the wild in June 2024. The vulnerability allowed attackers to verify whether specific phone numbers were registered with Authy by sending requests to an unsecured API endpoint (NVD, MITRE).

Technical details

The vulnerability (CVE-2024-39891) has been assigned a CVSS v3.1 Base Score of 5.3 (MEDIUM) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N. The flaw involved an unauthenticated API endpoint that accepted streams of phone numbers and responded with information about whether each number was registered with Authy. The vulnerability is classified as CWE-203 (Observable Discrepancy) (NVD, CWE).

Impact

The vulnerability exposed phone numbers of Authy multi-factor authentication users, potentially making them vulnerable to SMS phishing and SIM swapping attacks. A threat actor compiled a list containing over 33 million phone numbers registered with the Authy service by exploiting this vulnerability (Bleeping Computer).

Mitigation and workarounds

Twilio has secured the vulnerable API endpoint and no longer allows unauthenticated requests. Users are advised to upgrade to Authy Android version 25.1.0 or later and Authy iOS version 26.1.0 or later. Additionally, users should ensure their mobile accounts are configured to block number transfers without providing a passcode and be vigilant against potential SMS phishing attacks (Bleeping Computer).

Community reactions

The vulnerability was deemed significant enough to be added to CISA's Known Exploited Vulnerabilities (KEV) catalog, requiring Federal Civilian Executive Branch (FCEB) agencies to remediate the vulnerability by August 13, 2024 (CISA).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management