First published: Thu Mar 05 2020(Updated: )
The sync endpoint in YubiKey Validation Server before 2.40 allows remote attackers to replay an OTP. NOTE: this issue is potentially relevant to persons outside Yubico who operate a self-hosted OTP validation service with a non-default configuration such as an open sync pool; the issue does NOT affect YubiCloud.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Yubico Yubikey One Time Password Validation Server | <2.40 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10185 is a vulnerability in YubiKey Validation Server before version 2.40 that allows remote attackers to replay an OTP (One-Time Password).
CVE-2020-10185 has a severity rating of 8.6 (high).
An attacker can exploit CVE-2020-10185 by replaying an OTP (One-Time Password) to gain unauthorized access.
Yes, Yubico YubiKey One Time Password Validation Server versions up to and excluding 2.40 are affected by CVE-2020-10185.
To mitigate CVE-2020-10185, it is recommended to update YubiKey Validation Server to version 2.40 or higher.