First published: Sat Nov 09 2024(Updated: )
Mattermost versions 9.11.x <= 9.11.2, and 9.5.x <= 9.5.10 fail to protect the mfa code against replay attacks, which allows an attacker to reuse the MFA code within ~30 seconds
Credit: responsibledisclosure@mattermost.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mattermost | >=9.5.0<9.5.11 | |
Mattermost | >=9.11.0<9.11.3 |
Update Mattermost to versions 10.1.0, 9.11.3, 9.5.11 or higher.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-36250 is classified as a high-severity vulnerability due to its potential to allow replay attacks on MFA codes.
To fix CVE-2024-36250, upgrade to Mattermost versions 9.11.3 or later, or 9.5.11 or later.
CVE-2024-36250 affects Mattermost versions 9.11.x up to 9.11.2 and 9.5.x up to 9.5.10.
In the context of CVE-2024-36250, a replay attack refers to an attack where an MFA code can be reused within approximately 30 seconds.
Using vulnerable versions of Mattermost related to CVE-2024-36250 increases the risk of unauthorized access due to the inadequately protected MFA codes.