On October 30, 2024, a security flaw was detected in Okta’s AD/LDAP Delegated Authentication (DelAuth) service. This issue, linked to how cache keys were generated using Bcrypt, could potentially allow authentication bypasses when specific criteria were met. Under precise conditions, a user might authenticate by supplying a username 52 characters or more that corresponded with a cache key from a previous successful login.
This flaw impacted Okta AD/LDAP DelAuth from July 23, 2024, until the fix was applied in production on October 30, 2024.
Exploitation of this vulnerability was only feasible when all of the following conditions were present:
On October 30, 2024, Okta switched from Bcrypt to PBKDF2 for cache key generation, effectively addressing the vulnerability.
If your organization relies on AD/LDAP DelAuth and meets the described conditions, it is recommended you take the following actions: