
A recently disclosed vulnerability in Okta, a widely used identity and access management platform, has raised concerns over security protocols. The flaw allows accounts with usernames longer than 52 characters to bypass password authentication, potentially exposing sensitive information. This issue was made public on October 30, when Okta acknowledged that the vulnerability could be exploited if a user had previously logged in successfully. Experts noted that this weakness stems from the way Okta generates security keys, utilizing bcrypt to hash a combined string of userId, username, and password, which only processes the first 72 bytes of input. As a result, employees with long usernames may pose a security risk, prompting discussions on necessary mitigations.
This article @Forbes now updated to include step-by-step instructions on Google's Advanced Protection Programme enrolment process. #infosec https://t.co/BxFAhpQJAl
An Okta login bug bypassed checking passwords on some long usernames https://t.co/Fw4zvRIciW
Okta (popular identity & access management platform) generated security keys with bcrypt to hash a combined string of userId|username|password. This insecure scheme allowed an authentication bypass as bcrypt only processes the first 72 bytes of an input. To mitigate such risks,… https://t.co/26pQEmwSmD