The Cybersecurity Agency CISA Includes Twilio Authy and IE Defects in List of Exploited Weaknesses

î ‚Jul 24, 2024î „NewsroomVulnerability / Software Security

The U.S.

CISA Adds Twilio Authy and IE Flaws to Exploited Vulnerabilities List

î ‚Jul 24, 2024î „NewsroomVulnerability / Software Security

CISA Adds Twilio Authy and IE Flaws to Exploited Vulnerabilities List

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Catalog of Known Exploited Vulnerabilities (KEV) by adding two security vulnerabilities that are being actively exploited.

Below are the vulnerabilities listed:

  • CVE-2012-4792 (CVSS score: 9.3) – Vulnerability in Microsoft Internet Explorer causing Use-After-Free
  • CVE-2024-39891 (CVSS score: 5.3) – Weakness in Twilio Authy leading to Information Disclosure

CVE-2012-4792 is an old use-after-free flaw in Internet Explorer that can enable a remote attacker to execute unauthorized code via a specifically crafted website.

Cybersecurity

It is currently uncertain whether this flaw has been targeted in recent exploitation attempts, although it was misused in watering hole attacks on the Council on Foreign Relations (CFR) and Capstone Turbine Corporation websites around December 2012.

On the contrary, CVE-2024-39891 denotes a vulnerability in an unauthenticated endpoint within Twilio Authy that could be manipulated to “accept a request containing a phone number and then respond with information about the registration status of the phone number with Authy.”

Recently, Twilio mentioned that the issue has been fixed in versions 25.1.0 (Android) and 26.1.0 (iOS) after unidentified threat actors exploited the weakness to access data associated with Authy accounts.

“These kinds of vulnerabilities are common entry points for malicious cyber attackers and pose substantial threats to the federal enterprise,” as stated by CISA in a notice.

Federal Civilian Executive Branch (FCEB) agencies are obligated to address the identified weaknesses by August 13, 2024, to safeguard their networks against active cyber threats.

Found this article intriguing? Follow us on Twitter ï‚™ and LinkedIn for more exclusive content we publish.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.