CVE-2023-44039

In VeridiumID before 3.5.0, the WebAuthn API allows an internal unauthenticated attacker (who can pass enrollment verifications and is allowed to enroll a FIDO key) to register their FIDO authenticator to a victim’s account and consequently take over the account.
Configurations

Configuration 1 (hide)

cpe:2.3:a:veridiumid:veridiumad:*:*:*:*:*:*:*:*

History

16 Apr 2025, 15:20

Type Values Removed Values Added
CWE NVD-CWE-noinfo
First Time Veridiumid veridiumad
Veridiumid
References () https://docs.veridiumid.com/docs/v3.5/security-advisory#id-%28v3.52%29SecurityAdvisory-Acknowledgement - () https://docs.veridiumid.com/docs/v3.5/security-advisory#id-%28v3.52%29SecurityAdvisory-Acknowledgement - Vendor Advisory
References () https://veridiumid.com/veridium-id-authentication-platform/ - () https://veridiumid.com/veridium-id-authentication-platform/ - Product
CPE cpe:2.3:a:veridiumid:veridiumad:*:*:*:*:*:*:*:*

Information

Published : 2024-04-03 16:15

Updated : 2025-04-16 15:20


NVD link : CVE-2023-44039

Mitre link : CVE-2023-44039

CVE.ORG link : CVE-2023-44039


JSON object : View

Products Affected

veridiumid

  • veridiumad
CWE
NVD-CWE-noinfo CWE-287

Improper Authentication