{ "id": "CVE-2024-39891", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-02T18:15:03.447", "lastModified": "2024-07-24T14:38:43.270", "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2024-07-23", "cisaActionDue": "2024-08-13", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Twilio Authy Information Disclosure Vulnerability", "descriptions": [ { "lang": "en", "value": "In the Twilio Authy API, accessed by Authy Android before 25.1.0 and Authy iOS before 26.1.0, an unauthenticated endpoint provided access to certain phone-number data, as exploited in the wild in June 2024. Specifically, the endpoint accepted a stream of requests containing phone numbers, and responded with information about whether each phone number was registered with Authy. (Authy accounts were not compromised, however.)" }, { "lang": "es", "value": "En la API de Twilio Authy, a la que acced\u00eda Authy Android antes de 25.1.0 y Authy iOS antes de 26.1.0, un endpoint no autenticado proporcionaba acceso a ciertos datos de n\u00fameros de tel\u00e9fono. (Sin embargo, las cuentas de Authy no se vieron comprometidas)." } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 3.9, "impactScore": 1.4 }, { "source": "cve@mitre.org", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 3.9, "impactScore": 1.4 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-203" } ] }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-203" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:twilio:authy:*:*:*:*:*:iphone_os:*:*", "versionEndExcluding": "26.1.0", "matchCriteriaId": "F645AEA3-6ACC-4386-ACA9-793E66DBF31E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:twilio:authy_authenticator:*:*:*:*:*:android:*:*", "versionEndExcluding": "25.1.0", "matchCriteriaId": "07B60ED3-2C9B-46F8-9B6C-1FFB46067D06" } ] } ] } ], "references": [ { "url": "https://cwe.mitre.org/data/definitions/203.html", "source": "cve@mitre.org", "tags": [ "Technical Description" ] }, { "url": "https://www.bleepingcomputer.com/news/security/hackers-abused-api-to-verify-millions-of-authy-mfa-phone-numbers/", "source": "cve@mitre.org", "tags": [ "Press/Media Coverage" ] }, { "url": "https://www.twilio.com/docs/usage/security/reporting-vulnerabilities", "source": "cve@mitre.org", "tags": [ "Product" ] }, { "url": "https://www.twilio.com/en-us/changelog", "source": "cve@mitre.org", "tags": [ "Product", "Release Notes" ] } ] }