Description
The sync endpoint in YubiKey Validation Server before 2.40 allows remote attackers to replay an OTP. NOTE: this issue is potentially relevant to persons outside Yubico who operate a self-hosted OTP validation service with a non-default configuration such as an open sync pool; the issue does NOT affect YubiCloud.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2141-1 | yubikey-val security update |
EUVD |
EUVD-2020-2647 | The sync endpoint in YubiKey Validation Server before 2.40 allows remote attackers to replay an OTP. NOTE: this issue is potentially relevant to persons outside Yubico who operate a self-hosted OTP validation service with a non-default configuration such as an open sync pool; the issue does NOT affect YubiCloud. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T10:58:39.520Z
Reserved: 2020-03-05T00:00:00.000Z
Link: CVE-2020-10185
No data.
Status : Modified
Published: 2020-03-05T23:15:13.353
Modified: 2024-11-21T04:54:55.647
Link: CVE-2020-10185
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD