Vulnerability Details CVE-2024-39891
In the Twilio Authy API, accessed by Authy Android before 25.1.0 and Authy iOS before 26.1.0, an unauthenticated endpoint provided access to certain phone-number data, as exploited in the wild in June 2024. Specifically, the endpoint accepted a stream of requests containing phone numbers, and responded with information about whether each phone number was registered with Authy. (Authy accounts were not compromised, however.)
Exploit prediction scoring system (EPSS) score
EPSS Score 0.181
EPSS Ranking 94.9%
CVSS Severity
CVSS v3 Score 5.3
Proposed Action
Twilio Authy contains an information disclosure vulnerability in its API that allows an unauthenticated endpoint to accept a request containing a phone number and respond with information about whether the phone number was registered with Authy.
Ransomware Campaign
Unknown
Products affected by CVE-2024-39891
-
-
cpe:2.3:a:twilio:authy:24.7.2
-
cpe:2.3:a:twilio:authy:24.7.3
-
cpe:2.3:a:twilio:authy:24.8.0
-
cpe:2.3:a:twilio:authy:24.8.1
-
cpe:2.3:a:twilio:authy:24.8.2
-
cpe:2.3:a:twilio:authy:24.8.4
-
cpe:2.3:a:twilio:authy:24.9.0
-
cpe:2.3:a:twilio:authy:24.9.1
-
cpe:2.3:a:twilio:authy:24.9.2
-
cpe:2.3:a:twilio:authy:25.0.0
-
cpe:2.3:a:twilio:authy:25.0.1
-
cpe:2.3:a:twilio:authy:25.1.0
-
cpe:2.3:a:twilio:authy:25.1.1
-
cpe:2.3:a:twilio:authy:25.1.2
-
cpe:2.3:a:twilio:authy:25.2.0
-
cpe:2.3:a:twilio:authy:25.2.1
-
cpe:2.3:a:twilio:authy:25.2.2
-
cpe:2.3:a:twilio:authy:25.2.4
-
cpe:2.3:a:twilio:authy:25.2.5
-
cpe:2.3:a:twilio:authy:25.2.6
-
cpe:2.3:a:twilio:authy:25.2.7
-
cpe:2.3:a:twilio:authy:26.0.0
-
cpe:2.3:a:twilio:authy:26.0.1
-
cpe:2.3:a:twilio:authy:26.0.2
-
cpe:2.3:a:twilio:authy_authenticator:*