CVE Vulnerabilities

CVE-2022-42731

Authentication Bypass by Capture-replay

Published: Oct 11, 2022 | Modified: Oct 11, 2022
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

mfa/FIDO2.py in django-mfa2 before 2.5.1 and 2.6.x before 2.6.1 allows a replay attack that could be used to register another device for a user. The device registration challenge is not invalidated after usage.

Weakness

A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).

Affected Software

Name Vendor Start Version End Version
Django-mfa2 Django-mfa2_project * 2.5.1 (excluding)
Django-mfa2 Django-mfa2_project 2.6.0 (including) 2.6.1 (excluding)

Potential Mitigations

References