Okta just squashed a particularly unusual bug in its software.
The oral eroticismdigital security management company posted a bug fix report to its website (as spotted by The Verge) letting users know that a glitch in the system that theoretically allowed bad actors to gain access to accounts had been ironed out. Sounds normal enough, right? Well, here's the kicker: The bug could've allowed someone to log into an account without entering the passwordas long as the username was 52 characters or longer.
"During specific conditions, this could allow users to authenticate by only providing the username with the stored cache key of a previous successful authentication," Okta wrote.
It should be re-emphasized that this is no longer a concern for Okta users. The bug has been fixed. Unfortunately, it existed in the system for about three months, as Okta's report said the software had been affected since July until someone noticed on Oct. 30. That's a very long time for such a vulnerability to be present, but it's unclear at this point if anyone was negatively affected by it.
Topics Cybersecurity
(Editor: {typename type="name"/})
Tips for Playing PlayerUnknown's Battlegrounds
Best Samsung The Frame TV deal: Save $700 at Best Buy
Samsung Galaxy S25 price, preorder details: How to get the S25, S25+, or S25 Ultra
Best Samsung Galaxy S25 Ultra case deal: Save $27.50 on Kindsuit case
Sri Lanka vs. Australia 2025 livestream: Watch 1st ODI for free
Best earbuds deal: Save $30 on the Beats Fit Pro
Best Samsung Galaxy S25 Ultra screen protector deal: Save over $10
NYT Connections Sports Edition hints and answers for January 23: Tips to solve Connections #122
Obama photographer Pete Souza on Trump: 'We failed our children'
What's new to streaming this week? (Jan. 24, 2025)
Google 'Ask for me:' AI that calls businesses on your behalf for pricing and availability
Best Samsung TV deal: Save $498 on 85
接受PR>=1、BR>=1,流量相当,内容相关类链接。