On October 30, 2024, a security flaw was detected in Okta’s AD/LDAP Delegated Authentication (DelAuth) service. This issue, linked to how cache keys were generated using Bcrypt, could potentially allow authentication bypasses when specific criteria were met. Under precise conditions, a user might authenticate by supplying a username 52 characters or more that corresponded with a cache key from a previous successful login.
This flaw impacted Okta AD/LDAP DelAuth from July 23, 2024, until the fix was applied in production on October 30, 2024.
Exploitation of this vulnerability was only feasible when all of the following conditions were present:
On October 30, 2024, Okta switched from Bcrypt to PBKDF2 for cache key generation, effectively addressing the vulnerability.
If your organization relies on AD/LDAP DelAuth and meets the described conditions, it is recommended you take the following actions:
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.
Block quote
Ordered list
Unordered list
Bold text
Emphasis
Superscript
Subscript