{ "id": "CVE-2023-44039", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-03T16:15:07.093", "lastModified": "2024-04-03T17:24:18.150", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In VeridiumID before 3.5.0, the WebAuthn API allows an internal unauthenticated attacker (who can pass enrollment verifications and is allowed to enroll a FIDO key) to register their FIDO authenticator to a victim\u2019s account and consequently take over the account." }, { "lang": "es", "value": "En VeridiumID anterior a 3.5.0, la API WebAuthn permite que un atacante interno no autenticado (que puede pasar verificaciones de inscripci\u00f3n y puede registrar una clave FIDO) registre su autenticador FIDO en la cuenta de una v\u00edctima y, en consecuencia, se haga cargo de la cuenta." } ], "metrics": {}, "references": [ { "url": "https://docs.veridiumid.com/docs/v3.5/security-advisory#id-%28v3.52%29SecurityAdvisory-Acknowledgement", "source": "cve@mitre.org" }, { "url": "https://veridiumid.com/veridium-id-authentication-platform/", "source": "cve@mitre.org" } ] }