First published: Wed Sep 01 2021(Updated: )
CyberArk Identity 21.5.131, when handling an invalid authentication attempt, sometimes reveals whether the username is valid. In certain authentication policy configurations with MFA, the API response length can be used to differentiate between a valid user and an invalid one (aka Username Enumeration). Response differentiation enables attackers to enumerate usernames of valid application users. Attackers can use this information to leverage brute-force and dictionary attacks in order to discover valid account information such as passwords.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CyberArk Identity | <21.11.133 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-37151.
The severity level of CVE-2021-37151 is medium.
The affected software for CVE-2021-37151 is CyberArk Identity 21.5.131 up to, but not including, version 21.11.133.
CVE-2021-37151 affects CyberArk Identity by sometimes revealing whether the username is valid during an invalid authentication attempt.
Yes, a fix is available for CVE-2021-37151. Users should update to version 21.11.133 or later of CyberArk Identity to mitigate this vulnerability.