First published: Wed Apr 03 2024(Updated: )
In VeridiumID before 3.5.0, the WebAuthn API allows an internal unauthenticated attacker (who can pass enrollment verifications and is allowed to enroll a FIDO key) to register their FIDO authenticator to a victim’s account and consequently take over the account.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VeridiumID | <3.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-44039 has been classified with a high severity due to the potential for account takeover.
To fix CVE-2023-44039, update VeridiumID to version 3.5.0 or later.
CVE-2023-44039 affects users of VeridiumID versions prior to 3.5.0.
CVE-2023-44039 involves an internal unauthenticated attacker registering a FIDO authenticator to a victim’s account.
The impact of CVE-2023-44039 is the potential unauthorized access and account takeover.