Facebook exposed a security vulnerability that can be brute-forced to bypass two-factor authentication

Facebook exposed a security vulnerability that can be brute-forced to bypass two-factor authentication

Security researchers from Nepal recently discovered a new vulnerability in the login system of Meta's Facebook, Instagram and other applications, allowing anyone to bypass Facebook's two-factor authentication.

"Anyone can exploit this vulnerability to bypass SMS-based two-factor authentication if they know the recipient's phone number," researcher Gtm Mänôz told TechCrunch.

Mänôz said the vulnerability existed in Meta Group's unified login system, where Meta did not set an attempt limit when users entered the two-factor code used to log into their accounts.

This means that all an attacker needs to know is the target's phone number or email address, and they can brute force the two-factor SMS code. Once the attacker obtains the correct verification code, the attacker can then launch subsequent attacks.

It is understood that even after the attacker successfully attacks, Meta will remind the user that the account has been linked to someone else's account, so two-factor authentication is disabled.

Mänôz reported the bug to the company last year, and Meta has now fixed the vulnerability. Meta eventually paid him $27,200 (currently about 184,000 RMB) for his discovery.

<<:  HPE (Aruba) Named a Leader in Gartner® 2022 Magic Quadrant™ for Enterprise Wired and Wireless LAN Infrastructure for the 17th Consecutive Year

>>:  How to use ip command to manage network in Linux

Recommend

Improving the value of colocation data centers with DCIM

Today, as the popularity of colocation data cente...

5G and IoT bring big data boom

When interest in Hadoop began a few years ago, WA...

What are the deployments and arrangements for 5G in 2022? MIIT responds

On January 20, the State Council Information Offi...

Linux Network Monitoring Tools

Network communication is one of the most basic fu...

What is a Computer Network Hub?

Quick definition: A computer network hub is a lay...

5G will explode with AI, cloud, and edge computing

The 5G era has arrived, and all walks of life are...

There are about 180 million users of 5G packages using 4G terminals

Recently, the net increase in 5G package users of...

Implementing a simple TCP custom protocol based on Kotlin

1. Development Background If you want to be an ex...

Three ways to improve WiFi signal

"I'm stuck in a circle after watching ha...