Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Organizations Warned of Exploited Twilio Authy Vulnerability

CISA warns of the in-the-wild exploitation of CVE-2024-39891, a Twilio Authy bug leading to the disclosure of phone number data.

Twilio

The US cybersecurity agency CISA on Tuesday announced that it has added a recent Twilio Authy bug to its Known Exploited Vulnerabilities (KEV) catalog.

Tracked as CVE-2024-39891, the security defect is described as an information disclosure issue in the Twilio Authy API accessed by Authy Android before 25.1.0 and Authy iOS before 26.1.0, and resides in an unauthenticated endpoint leaking phone number data.

“Specifically, the endpoint accepted a stream of requests containing phone numbers, and responded with information about whether each phone number was registered with Authy. (Authy accounts were not compromised, however.),” a NIST advisory reads.

Twilio warned of this vulnerability on July 1, urging users to update to Authy Android version 25.1.0 and iOS App version 26.1.0.

“Twilio has detected that threat actors were able to identify data associated with Authy accounts, including phone numbers, due to an unauthenticated endpoint. We have taken action to secure this endpoint and no longer allow unauthenticated requests,” the company said.

No Twilio systems were compromised and no other sensitive internal data was accessed as part of the identified attacks, the company said.

Advertisement. Scroll to continue reading.

“As a precaution, we are requesting that all Authy users update to the latest Android and iOS apps for the latest security updates. While Authy accounts are not compromised, threat actors may try to use the phone number associated with Authy accounts for phishing and smishing attacks,” Twilio said.

Twilio’s alert came after the notorious ShinyHunters hackers announced in late June that they had leaked 33 million phone numbers associated with Authy.

On Tuesday, CISA added CVE-2024-39891 to KEV, urging federal agencies to identify vulnerable instances in their environments before August 13, in line with Binding Operational Directive (BOD) 22-01.

The agency also added CVE-2012-4792, a use-after-free in Internet Explorer leading to arbitrary code execution. The first reports regarding this bug’s exploitation are over a decade old.

While BOD 22-01 only applies to federal agencies, organizations of all types are advised to review CISA’s KEV list and address the vulnerabilities in it as soon as possible.

Related: Recent Adobe Commerce Vulnerability Exploited in Wild

Related: CISA Red Team Exercise Finds Critical Vulnerabilities in Federal Civilian Agency

Related: FDA, CISA: Illumina Medical Devices Vulnerable to Remote Hacking

Related: CISA Tells Orgs to Patch WatchGuard Flaw Exploited for Months Before Disclosure

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Neill Feather has been named Chief Executive Officer at Point Wild.

Oasis Security has appointed Michael DeCesare as President.

Sterling Wilson has joined IGEL as Global Field CTO, Business Continuity and Disaster Recovery.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.