Okta just squashed a particularly unusual bug in its software.
The xxx tv showdigital security management company posted a bug fix report to its website (as spotted by The Verge) letting users know that a glitch in the system that theoretically allowed bad actors to gain access to accounts had been ironed out. Sounds normal enough, right? Well, here's the kicker: The bug could've allowed someone to log into an account without entering the passwordas long as the username was 52 characters or longer.
"During specific conditions, this could allow users to authenticate by only providing the username with the stored cache key of a previous successful authentication," Okta wrote.
It should be re-emphasized that this is no longer a concern for Okta users. The bug has been fixed. Unfortunately, it existed in the system for about three months, as Okta's report said the software had been affected since July until someone noticed on Oct. 30. That's a very long time for such a vulnerability to be present, but it's unclear at this point if anyone was negatively affected by it.
Topics Cybersecurity
(Editor: {typename type="name"/})
Sony launches new flagship XM6 headphones: Order them now
Former Twitter/X executives sue Elon Musk for $128 million in unpaid severance
Buy $60, get $15 off Unilever essentials at Amazon
The people love 'Dune: Part Two'
Seven Steam games whose reviews have changed a lot
Best Lego deal: Score the Lego Classic Large Creative Brick Box for 45% off at Amazon
How to watch the total solar eclipse from anywhere on Earth
Here's all the cool stuff you can do on social media to celebrate the eclipse
Musetti vs. Diallo 2025 livestream: Watch Madrid Open for free
M3 MacBook Air: 3 new features you won't find on the M2 MacBook Air
Your 'wrong person' texts may be linked to Myanmar warlord
Elon Musk's X has already backed off its new anti
接受PR>=1、BR>=1,流量相当,内容相关类链接。