Cyber Security

Okta Verify Agent Windows Flaw Let Attackers Steal User Passwords

Okta, a leading identity and access management company, has patched a critical vulnerability in its Verify agent for Windows that could allow attackers to steal user passwords.

The flaw, discovered during routine penetration testing, affects versions 5.0.2 to 5.3.2 of the Okta Verify agent for Windows.

The vulnerability tracked as CVE-2024-9191 is related to the Okta Device Access features.

It enables attackers with access to a compromised device to retrieve passwords associated with Desktop MFA passwordless logins through the OktaDeviceAccessPipe.

Build an in-house SOC or outsource SOC-as-a-Service -> Calculate Costs

Importantly, this vulnerability only affects users of the Okta Device Access passwordless feature. Customers using Okta Verify on other platforms or only using FastPass are not impacted.

Okta has addressed the issue in version 5.3.3 of the Verify agent for Windows. The company strongly recommends that all affected customers upgrade to this version or later to mitigate the risk.

The timeline of the vulnerability shows it was introduced on April 17, 2024, with version 5.0.2.

An Early Access version addressing the flaw was released on September 20, 2024, followed by a Generally Available release on October 25, 2024.

This incident highlights the importance of regular security audits and prompt patching. Okta users are advised to stay vigilant and keep their software up to date to protect against potential security threats.

As the vulnerability requires access to a compromised device, organizations should also focus on overall system security to prevent initial compromise attempts.

Run private, Real-time Malware Analysis in both Windows & Linux VMs. Get a 14-day free trial with ANY.RUN!

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

New Malware Hijacking Docker Images with Unique Obfuscation Technique

A newly discovered malware campaign is targeting Docker environments, employing a sophisticated, multi-layered obfuscation technique…

21 minutes ago

Why CISOs and CTOs Must Collaborate More Than Ever in Today’s Security Landscape

The pace of technological change in today’s business environment is unprecedented. Organizations are racing to…

24 minutes ago

Understanding Cyber Risk Appetite – A CISO’s Approach to Risk Management

Cyber risk appetite represents the amount and type of cyber risk an organization is willing…

26 minutes ago

Hackers Exploiting Microsoft 365 OAuth Workflows to Target Organizations

A new campaign by Russian threat actors. These actors are exploiting legitimate Microsoft OAuth 2.0…

30 minutes ago

Hackers Exploited 17-year-old Vulnerability to Weaponize Word Documents

Security researchers at Fortinet's FortiGuard Labs have uncovered a sophisticated phishing campaign that uses weaponized…

1 hour ago

Marks & Spencer Confirms a Cyberattack Hits Payments & Online Orders

British retail giant Marks & Spencer (M&S) has confirmed it is dealing with a significant…

2 hours ago