In VeridiumID before 3.5.0, the WebAuthn API allows an internal unauthenticated attacker (who can pass enrollment verifications and is allowed to enroll a FIDO key) to register their FIDO authenticator to a victim’s account and consequently take over the account.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 16 Apr 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Veridiumid
Veridiumid veridiumad |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:veridiumid:veridiumad:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Veridiumid
Veridiumid veridiumad |
Wed, 21 Aug 2024 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-287 | |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-21T20:39:03.740Z
Reserved: 2023-09-25T00:00:00
Link: CVE-2023-44039
Updated: 2024-08-02T19:52:12.029Z
Status : Analyzed
Published: 2024-04-03T16:15:07.093
Modified: 2025-04-16T15:20:29.897
Link: CVE-2023-44039
No data.
OpenCVE Enrichment
No data.
Weaknesses