Search criteria

13 vulnerabilities

CVE-2025-7371 (GCVE-0-2025-7371)

Vulnerability from cvelistv5 – Published: 2025-07-22 15:49 – Updated: 2025-07-22 19:21
VLAI?
Summary
Okta On-Premises Provisioning (OPP) agents log certain user data during administrator-initiated password resets. This vulnerability allows an attacker with access to the local servers running OPP agents to retrieve user personal information and temporary passwords created during password reset. You are affected by this vulnerability if the following preconditions are met: Local server running OPP agent with versions >=2.2.1 and <= 2.3.0, and User account has had an administrator-initiated password reset while using the affected versions.
CWE
  • CWE-532 - Insertion of Sensitive Information into Log File
Assigner
Impacted products
Vendor Product Version
Okta Okta On-Premises Provisioning Agent Affected: 2.2.1 , < 2.3.1 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-7371",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-07-22T19:20:52.253359Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-07-22T19:21:01.131Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Okta On-Premises Provisioning Agent",
          "vendor": "Okta",
          "versions": [
            {
              "lessThan": "2.3.1",
              "status": "affected",
              "version": "2.2.1",
              "versionType": "semver"
            }
          ]
        }
      ],
      "datePublic": "2025-07-22T15:45:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Okta On-Premises Provisioning (OPP) agents log certain user data during administrator-initiated password resets. This vulnerability allows an attacker with access to the local servers running OPP agents to retrieve user personal information and temporary passwords created during password reset. You are affected by this vulnerability if the following preconditions are met: Local server running OPP agent with versions \u003e=2.2.1 and \u003c= 2.3.0, and User account has had an administrator-initiated password reset while using the affected versions."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-532",
              "description": "CWE-532 Insertion of Sensitive Information into Log File",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-22T15:54:09.005Z",
        "orgId": "59b22baa-87b2-4371-8e4a-e080df12f74a",
        "shortName": "Okta"
      },
      "references": [
        {
          "tags": [
            "patch"
          ],
          "url": "https://help.okta.com/oie/en-us/content/topics/settings/version_histories/ver_history_opp_agent.htm"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Upgrade the OPP agent to version 2.3.1 or higher."
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "59b22baa-87b2-4371-8e4a-e080df12f74a",
    "assignerShortName": "Okta",
    "cveId": "CVE-2025-7371",
    "datePublished": "2025-07-22T15:49:06.579Z",
    "dateReserved": "2025-07-08T21:45:15.341Z",
    "dateUpdated": "2025-07-22T19:21:01.131Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-9875 (GCVE-0-2024-9875)

Vulnerability from cvelistv5 – Published: 2024-11-20 22:23 – Updated: 2024-11-22 15:25
VLAI?
Summary
Okta Privileged Access server agent (SFTD) versions 1.82.0 to 1.84.0 are affected by a privilege escalation vulnerability when the sudo command bundles feature is enabled. To remediate this vulnerability, upgrade the Okta Privileged Access server agent (SFTD) to version 1.87.1 or greater.
CWE
  • CWE-20 - Improper Input Validation
Assigner
Impacted products
Vendor Product Version
Okta Okta Privileged Access Server Agent (SFTD) Affected: 1.82.0 , < 1.84.0 (semver)
Create a notification for this product.
Credits
Okta would like to thank Anvil Secure for discovering this vulnerability.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:okta:privileged_access_server_agent_sftd:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "privileged_access_server_agent_sftd",
            "vendor": "okta",
            "versions": [
              {
                "lessThan": "1.84.0",
                "status": "affected",
                "version": "1.82.0",
                "versionType": "semver"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-9875",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-22T15:23:16.211195Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-22T15:25:43.803Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Okta Privileged Access Server Agent (SFTD)",
          "vendor": "Okta",
          "versions": [
            {
              "lessThan": "1.84.0",
              "status": "affected",
              "version": "1.82.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Okta would like to thank Anvil Secure for discovering this vulnerability."
        }
      ],
      "datePublic": "2024-11-20T22:15:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Okta Privileged Access server agent (SFTD) versions 1.82.0 to 1.84.0 are affected by a privilege escalation vulnerability when the sudo command bundles feature is enabled. To remediate this vulnerability, upgrade the Okta Privileged Access server agent (SFTD) to version 1.87.1 or greater."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-20T22:38:32.486Z",
        "orgId": "59b22baa-87b2-4371-8e4a-e080df12f74a",
        "shortName": "Okta"
      },
      "references": [
        {
          "url": "https://help.okta.com/asa/en-us/content/topics/releasenotes/advanced-server-access-release-notes.htm"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "To remediate this vulnerability, upgrade the Okta Privileged Access server agent (SFTD) to version 1.87.1 or greater."
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "59b22baa-87b2-4371-8e4a-e080df12f74a",
    "assignerShortName": "Okta",
    "cveId": "CVE-2024-9875",
    "datePublished": "2024-11-20T22:23:15.230Z",
    "dateReserved": "2024-10-11T16:36:50.988Z",
    "dateUpdated": "2024-11-22T15:25:43.803Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-9191 (GCVE-0-2024-9191)

Vulnerability from cvelistv5 – Published: 2024-11-01 21:21 – Updated: 2024-11-05 15:23
VLAI?
Summary
The Okta Device Access features, provided by the Okta Verify agent for Windows, provides access to the OktaDeviceAccessPipe, which enables attackers in a compromised device to retrieve passwords associated with Desktop MFA passwordless logins. The vulnerability was discovered via routine penetration testing. Note: A precondition of this vulnerability is that the user must be using the Okta Device Access passwordless feature. Okta Device Access users not using passwordless are not affected, and customers only using Okta Verify on platforms other than Windows, or only using FastPass are not affected.
CWE
  • CWE-276 - Incorrect Default Permissions
Assigner
Impacted products
Vendor Product Version
Okta Okta Verify for Windows Affected: 5.0.2 , < 5.3.3 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:okta:verify:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "verify",
            "vendor": "okta",
            "versions": [
              {
                "lessThan": "5.3.3",
                "status": "affected",
                "version": "5.0.2",
                "versionType": "semver"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-9191",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-05T15:22:10.829745Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-05T15:23:21.631Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Okta Verify for Windows",
          "vendor": "Okta",
          "versions": [
            {
              "lessThan": "5.3.3",
              "status": "affected",
              "version": "5.0.2",
              "versionType": "semver"
            }
          ]
        }
      ],
      "datePublic": "2024-11-01T20:15:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Okta Device Access features, provided by the Okta Verify agent for Windows, provides access to the OktaDeviceAccessPipe, which enables attackers in a compromised device to retrieve passwords associated with Desktop MFA passwordless logins. The vulnerability was discovered via routine penetration testing.\n\nNote: A precondition of this vulnerability is that the user must be using the Okta Device Access passwordless feature. Okta Device Access users not using passwordless are not affected, and customers only using Okta Verify on platforms other than Windows, or only using FastPass are not affected."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-276",
              "description": "CWE-276 Incorrect Default Permissions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-01T21:21:11.040Z",
        "orgId": "59b22baa-87b2-4371-8e4a-e080df12f74a",
        "shortName": "Okta"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://trust.okta.com/security-advisories/"
        },
        {
          "url": "https://help.okta.com/oie/en-us/content/topics/releasenotes/oie-ov-release-notes.htm#panel4"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "The vulnerability is present in Okta Verify versions 5.0.2 to 5.3.2 and resolved in Okta Verify for Windows version 5.3.3. To remediate this vulnerability, upgrade Okta Verify for Windows to version 5.3.3 or greater."
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "59b22baa-87b2-4371-8e4a-e080df12f74a",
    "assignerShortName": "Okta",
    "cveId": "CVE-2024-9191",
    "datePublished": "2024-11-01T21:21:11.040Z",
    "dateReserved": "2024-09-25T20:44:58.116Z",
    "dateUpdated": "2024-11-05T15:23:21.631Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-10327 (GCVE-0-2024-10327)

Vulnerability from cvelistv5 – Published: 2024-10-24 20:17 – Updated: 2024-10-25 15:22
VLAI?
Summary
A vulnerability in Okta Verify for iOS versions 9.25.1 (beta) and 9.27.0 (including beta) allows push notification responses through the iOS ContextExtension feature allowing the authentication to proceed regardless of the user’s selection. When a user long-presses the notification banner and selects an option, both options allow the authentication to succeed. The ContextExtension feature is one of several push mechanisms available when using Okta Verify Push on iOS devices. The vulnerable flows include: * When a user is presented with a notification on a locked screen, the user presses on the notification directly and selects their reply without unlocking the device; * When a user is presented with a notification on the home screen and drags the notification down and selects their reply; * When an Apple Watch is used to reply directly to a notification. A pre-condition for this vulnerability is that the user must have enrolled in Okta Verify while the Okta customer was using Okta Classic. This applies irrespective of whether the organization has since upgraded to Okta Identity Engine.
CWE
  • CWE-287 - Improper Authentication
Assigner
Impacted products
Vendor Product Version
Okta Okta Verify for iOS Affected: 9.25.1 (semver)
Affected: 9.27.0 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:okta:verify:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "verify",
            "vendor": "okta",
            "versions": [
              {
                "status": "affected",
                "version": "9.25.1"
              },
              {
                "status": "affected",
                "version": "9.27.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-10327",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-25T15:21:49.116020Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-25T15:22:54.766Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Okta Verify for iOS",
          "vendor": "Okta",
          "versions": [
            {
              "status": "affected",
              "version": "9.25.1",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "9.27.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "datePublic": "2024-10-24T20:15:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in Okta Verify for iOS versions 9.25.1 (beta) and 9.27.0 (including beta) allows push notification responses through the iOS ContextExtension feature allowing the authentication to proceed regardless of the user\u2019s selection. When a user long-presses the notification banner and selects an option, both options allow the authentication to succeed. \nThe ContextExtension feature is one of several push mechanisms available when using Okta Verify Push on iOS devices. The vulnerable flows include: \n* When a user is presented with a notification on a locked screen, the user presses on the notification directly and selects their reply without unlocking the device; \n* When a user is presented with a notification on the home screen and drags the notification down and selects their reply; \n* When an Apple Watch is used to reply directly to a notification. \n\n A pre-condition for this vulnerability is that the user must have enrolled in Okta Verify while the Okta customer was using Okta Classic. This applies irrespective of whether the organization has since upgraded to Okta Identity Engine."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-287",
              "description": "CWE-287 Improper Authentication",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-24T20:20:37.434Z",
        "orgId": "59b22baa-87b2-4371-8e4a-e080df12f74a",
        "shortName": "Okta"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://trust.okta.com/security-advisories/okta-verify-for-ios-cve-2024-10327/"
        },
        {
          "url": "https://help.okta.com/en-us/content/topics/releasenotes/okta-verify-release-notes.htm#panel2"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "The vulnerability is resolved in Okta Verify for iOS version 9.27.2. To remediate this vulnerability, upgrade Okta Verify for iOS to version 9.27.2 or greater."
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "59b22baa-87b2-4371-8e4a-e080df12f74a",
    "assignerShortName": "Okta",
    "cveId": "CVE-2024-10327",
    "datePublished": "2024-10-24T20:17:59.360Z",
    "dateReserved": "2024-10-23T23:57:14.831Z",
    "dateUpdated": "2024-10-25T15:22:54.766Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-7061 (GCVE-0-2024-7061)

Vulnerability from cvelistv5 – Published: 2024-08-07 16:35 – Updated: 2024-08-09 13:44
VLAI?
Summary
Okta Verify for Windows is vulnerable to privilege escalation through DLL hijacking. The vulnerability is fixed in Okta Verify for Windows version 5.0.2. To remediate this vulnerability, upgrade to 5.0.2 or greater.
CWE
  • CWE-22 - Improper Limitation of a Pathname to a Restricted Directory
  • CWE-427 - Uncontrolled Search Path or Element
Assigner
Impacted products
Vendor Product Version
Okta Okta Verify for Windows Affected: 5.0.1 , < 5.0.1 (semver)
Unaffected: 5.0.2 (semver)
Create a notification for this product.
Credits
Okta would like to thank Ryan Wincey of Securifera, Inc. for discovering this vulnerability.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-7061",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-09T13:44:41.455152Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-09T13:44:51.144Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Okta Verify for Windows",
          "vendor": "Okta",
          "versions": [
            {
              "lessThan": "5.0.1",
              "status": "affected",
              "version": "5.0.1",
              "versionType": "semver"
            },
            {
              "status": "unaffected",
              "version": "5.0.2",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Okta would like to thank Ryan Wincey of Securifera, Inc. for discovering this vulnerability."
        }
      ],
      "datePublic": "2024-08-07T17:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Okta Verify for Windows is vulnerable to privilege escalation through DLL hijacking. The vulnerability is fixed in Okta Verify for Windows version 5.0.2. To remediate this vulnerability, upgrade to 5.0.2 or greater."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory",
              "lang": "en",
              "type": "CWE"
            },
            {
              "cweId": "CWE-427",
              "description": "CWE-427 Uncontrolled Search Path or Element",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-07T16:37:01.719Z",
        "orgId": "59b22baa-87b2-4371-8e4a-e080df12f74a",
        "shortName": "Okta"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://trust.okta.com/security-advisories/okta-verify-for-windows-privilege-escalation-cve-2024-7061/"
        },
        {
          "url": "https://help.okta.com/oie/en-us/content/topics/releasenotes/oie-ov-release-notes.htm#panel4"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "The vulnerability is fixed in Okta Verify for Windows version 5.0.2. To remediate this vulnerability, upgrade to 5.0.2 or greater."
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "59b22baa-87b2-4371-8e4a-e080df12f74a",
    "assignerShortName": "Okta",
    "cveId": "CVE-2024-7061",
    "datePublished": "2024-08-07T16:35:44.403Z",
    "dateReserved": "2024-07-23T21:04:37.452Z",
    "dateUpdated": "2024-08-09T13:44:51.144Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-0981 (GCVE-0-2024-0981)

Vulnerability from cvelistv5 – Published: 2024-07-23 20:49 – Updated: 2024-08-01 18:26
VLAI?
Summary
Okta Browser Plugin versions 6.5.0 through 6.31.0 (Chrome/Edge/Firefox/Safari) are vulnerable to cross-site scripting. This issue occurs when the plugin prompts the user to save these credentials within Okta Personal. A fix was implemented to properly escape these fields, addressing the vulnerability. Importantly, if Okta Personal is not added to the plugin to enable multi-account view, the Workforce Identity Cloud plugin is not affected by this issue. The vulnerability is fixed in Okta Browser Plugin version 6.32.0 for Chrome/Edge/Safari/Firefox.
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation (Cross-site Scripting)
Assigner
References
Impacted products
Vendor Product Version
Okta Okta Browser Plugin Affected: 6.5.0 through 6.31.0 (semver)
Unaffected: 6.32.0 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-0981",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-24T13:21:12.411913Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-26T17:55:53.987Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T18:26:30.219Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://trust.okta.com/security-advisories/okta-browser-plugin-reflected-cross-site-scripting-cve-2024-0981"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Okta Browser Plugin",
          "vendor": "Okta",
          "versions": [
            {
              "status": "affected",
              "version": "6.5.0 through 6.31.0",
              "versionType": "semver"
            },
            {
              "status": "unaffected",
              "version": "6.32.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "datePublic": "2024-07-23T21:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Okta Browser Plugin versions 6.5.0 through 6.31.0 (Chrome/Edge/Firefox/Safari) are vulnerable to cross-site scripting. This issue occurs when the plugin prompts the user to save these credentials within Okta Personal. A fix was implemented to properly escape these fields, addressing the vulnerability. Importantly, if Okta Personal is not added to the plugin to enable multi-account view, the Workforce Identity Cloud plugin is not affected by this issue. The vulnerability is fixed in Okta Browser Plugin version 6.32.0 for Chrome/Edge/Safari/Firefox."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (Cross-site Scripting)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-07-23T20:53:13.772Z",
        "orgId": "59b22baa-87b2-4371-8e4a-e080df12f74a",
        "shortName": "Okta"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://trust.okta.com/security-advisories/okta-browser-plugin-reflected-cross-site-scripting-cve-2024-0981"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "The vulnerability is fixed in Okta Browser Plugin version 6.32.0 for Chrome/Edge/Safari/Firefox."
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "59b22baa-87b2-4371-8e4a-e080df12f74a",
    "assignerShortName": "Okta",
    "cveId": "CVE-2024-0981",
    "datePublished": "2024-07-23T20:49:31.774Z",
    "dateReserved": "2024-01-26T22:42:26.526Z",
    "dateUpdated": "2024-08-01T18:26:30.219Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-0980 (GCVE-0-2024-0980)

Vulnerability from cvelistv5 – Published: 2024-03-27 23:16 – Updated: 2024-08-01 18:26
VLAI?
Summary
The Auto-update service for Okta Verify for Windows is vulnerable to two flaws which in combination could be used to execute arbitrary code.
CWE
  • CWE-22 - Improper Limitation of a Pathname to a Restricted Directory
  • CWE-427 - Uncontrolled Search Path or Element
Assigner
Impacted products
Vendor Product Version
Okta Okta Verify for Windows Affected: 0 , < 4.10.7 (semver)
Create a notification for this product.
Credits
Okta would like to thank Ryan Wincey of Securifera, Inc. for providing information in addressing this vulnerability.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:okta:verify:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "verify",
            "vendor": "okta",
            "versions": [
              {
                "lessThan": "4.10.7",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "HIGH",
              "attackVector": "ADJACENT_NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.1,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-0980",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-03-30T04:00:54.049277Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-18T20:01:32.632Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T18:26:30.489Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://trust.okta.com/security-advisories/okta-verify-windows-auto-update-arbitrary-code-execution-cve-2024-0980"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Okta Verify for Windows",
          "vendor": "Okta",
          "versions": [
            {
              "lessThan": "4.10.7",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Okta would like to thank Ryan Wincey of Securifera, Inc. for providing information in addressing this vulnerability."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Auto-update service for Okta Verify for Windows is vulnerable to two flaws which in combination could be used to execute arbitrary code."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "Improper Limitation of a Pathname to a Restricted Directory",
              "lang": "en"
            },
            {
              "cweId": "CWE-427",
              "description": "Uncontrolled Search Path or Element",
              "lang": "en"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-03-28T16:59:21.177Z",
        "orgId": "59b22baa-87b2-4371-8e4a-e080df12f74a",
        "shortName": "Okta"
      },
      "references": [
        {
          "url": "https://trust.okta.com/security-advisories/okta-verify-windows-auto-update-arbitrary-code-execution-cve-2024-0980"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "59b22baa-87b2-4371-8e4a-e080df12f74a",
    "assignerShortName": "Okta",
    "cveId": "CVE-2024-0980",
    "datePublished": "2024-03-27T23:16:37.513Z",
    "dateReserved": "2024-01-26T22:42:20.854Z",
    "dateUpdated": "2024-08-01T18:26:30.489Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-0392 (GCVE-0-2023-0392)

Vulnerability from cvelistv5 – Published: 2023-11-08 20:37 – Updated: 2024-09-04 16:02
VLAI?
Summary
The LDAP Agent Update service with versions prior to 5.18 used an unquoted path, which could allow arbitrary code execution.
CWE
  • CWE-428 - Unquoted Search Path or Element
Assigner
Impacted products
Vendor Product Version
Okta LDAP Agent Affected: 0 , < 5.18 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T05:10:55.607Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://trust.okta.com/security-advisories/okta-ldap-agent-cve-2023-0392"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:okta:ldap_agent:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ldap_agent",
            "vendor": "okta",
            "versions": [
              {
                "lessThan": "5.18",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "HIGH",
              "attackVector": "LOCAL",
              "availabilityImpact": "LOW",
              "baseScore": 3.9,
              "baseSeverity": "LOW",
              "confidentialityImpact": "LOW",
              "integrityImpact": "LOW",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-0392",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-04T16:02:43.869848Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-428",
                "description": "CWE-428 Unquoted Search Path or Element",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-04T16:02:49.750Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "LDAP Agent",
          "vendor": "Okta",
          "versions": [
            {
              "lessThan": "5.18",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The LDAP Agent Update service with versions prior to 5.18 used an unquoted path, which could allow arbitrary code execution."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-428",
              "description": "Unquoted Search Path or Element",
              "lang": "en"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-08T20:37:14.786Z",
        "orgId": "59b22baa-87b2-4371-8e4a-e080df12f74a",
        "shortName": "Okta"
      },
      "references": [
        {
          "url": "https://trust.okta.com/security-advisories/okta-ldap-agent-cve-2023-0392"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "59b22baa-87b2-4371-8e4a-e080df12f74a",
    "assignerShortName": "Okta",
    "cveId": "CVE-2023-0392",
    "datePublished": "2023-11-08T20:37:14.786Z",
    "dateReserved": "2023-01-18T20:11:49.233Z",
    "dateUpdated": "2024-09-04T16:02:49.750Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-0093 (GCVE-0-2023-0093)

Vulnerability from cvelistv5 – Published: 2023-03-06 00:00 – Updated: 2025-03-06 19:42
VLAI?
Summary
Okta Advanced Server Access Client versions 1.13.1 through 1.65.0 are vulnerable to command injection due to the third party library webbrowser. An outdated library, webbrowser, used by the ASA client was found to be vulnerable to command injection. To exploit this issue, an attacker would need to phish the user to enter an attacker controlled server URL during enrollment.
CWE
  • Command Injection
Assigner
Impacted products
Vendor Product Version
Okta Advanced Server Access Affected: 1.13.1 through 1.65.0
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T05:02:43.461Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://trust.okta.com/security-advisories/okta-advanced-server-access-client-cve-2023-0093/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 8.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-0093",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-03-06T19:39:33.009371Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-77",
                "description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-06T19:42:29.370Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Advanced Server Access",
          "vendor": "Okta",
          "versions": [
            {
              "status": "affected",
              "version": "1.13.1 through 1.65.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Okta Advanced Server Access Client versions 1.13.1 through 1.65.0 are vulnerable to command injection due to the third party library webbrowser. An outdated library, webbrowser, used by the ASA client was found to be vulnerable to command injection. To exploit this issue, an attacker would need to phish the user to enter an attacker controlled server URL during enrollment."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Command Injection",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-03-06T00:00:00.000Z",
        "orgId": "59b22baa-87b2-4371-8e4a-e080df12f74a",
        "shortName": "Okta"
      },
      "references": [
        {
          "url": "https://trust.okta.com/security-advisories/okta-advanced-server-access-client-cve-2023-0093/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "59b22baa-87b2-4371-8e4a-e080df12f74a",
    "assignerShortName": "Okta",
    "cveId": "CVE-2023-0093",
    "datePublished": "2023-03-06T00:00:00.000Z",
    "dateReserved": "2023-01-05T00:00:00.000Z",
    "dateUpdated": "2025-03-06T19:42:29.370Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-3145 (GCVE-0-2022-3145)

Vulnerability from cvelistv5 – Published: 2023-01-12 00:00 – Updated: 2025-04-08 13:37
VLAI?
Summary
An open redirect vulnerability exists in Okta OIDC Middleware prior to version 5.0.0 allowing an attacker to redirect a user to an arbitrary URL.
CWE
  • Open Redirect
Assigner
Impacted products
Vendor Product Version
Okta Okta OIDC Middleware Affected: prior to 5.0.0
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T01:00:10.700Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/okta/okta-oidc-middleware/security/advisories/GHSA-58h4-9m7m-j9m4"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 4.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "LOW",
              "privilegesRequired": "NONE",
              "scope": "CHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2022-3145",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-08T13:36:52.687825Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-601",
                "description": "CWE-601 URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-08T13:37:49.124Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Okta OIDC Middleware",
          "vendor": "Okta",
          "versions": [
            {
              "status": "affected",
              "version": "prior to 5.0.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An open redirect vulnerability exists in Okta OIDC Middleware prior to version 5.0.0 allowing an attacker to redirect a user to an arbitrary URL."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Open Redirect",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-01-12T00:00:00.000Z",
        "orgId": "59b22baa-87b2-4371-8e4a-e080df12f74a",
        "shortName": "Okta"
      },
      "references": [
        {
          "url": "https://github.com/okta/okta-oidc-middleware/security/advisories/GHSA-58h4-9m7m-j9m4"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "59b22baa-87b2-4371-8e4a-e080df12f74a",
    "assignerShortName": "Okta",
    "cveId": "CVE-2022-3145",
    "datePublished": "2023-01-12T00:00:00.000Z",
    "dateReserved": "2022-09-06T00:00:00.000Z",
    "dateUpdated": "2025-04-08T13:37:49.124Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-1697 (GCVE-0-2022-1697)

Vulnerability from cvelistv5 – Published: 2022-09-06 17:18 – Updated: 2024-08-03 00:10
VLAI?
Summary
Okta Active Directory Agent versions 3.8.0 through 3.11.0 installed the Okta AD Agent Update Service using an unquoted path. Note: To remediate this vulnerability, you must uninstall Okta Active Directory Agent and reinstall Okta Active Directory Agent 3.12.0 or greater per the documentation.
Severity ?
No CVSS data available.
CWE
  • Unquoted Search Path or Element
Assigner
Impacted products
Vendor Product Version
Okta Okta Active Directory Agent Affected: 3.8.0, 3.9.0, 3.10.0, 3.11.0
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T00:10:03.895Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://trust.okta.com/security-advisories/okta-active-directory-agent-cve-2022-1697"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://help.okta.com/en-us/Content/Topics/Directory/ad-agent-update.htm"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.okta.com/help/s/article/Security-Notice-CVE-2022-1697-FAQ"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Okta Active Directory Agent",
          "vendor": "Okta",
          "versions": [
            {
              "status": "affected",
              "version": "3.8.0, 3.9.0, 3.10.0, 3.11.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Okta Active Directory Agent versions 3.8.0 through 3.11.0 installed the Okta AD Agent Update Service using an unquoted path. Note: To remediate this vulnerability, you must uninstall Okta Active Directory Agent and reinstall Okta Active Directory Agent 3.12.0 or greater per the documentation."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Unquoted Search Path or Element",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-09-13T15:13:26",
        "orgId": "59b22baa-87b2-4371-8e4a-e080df12f74a",
        "shortName": "Okta"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://trust.okta.com/security-advisories/okta-active-directory-agent-cve-2022-1697"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://help.okta.com/en-us/Content/Topics/Directory/ad-agent-update.htm"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.okta.com/help/s/article/Security-Notice-CVE-2022-1697-FAQ"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@okta.com",
          "ID": "CVE-2022-1697",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Okta Active Directory Agent",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "3.8.0, 3.9.0, 3.10.0, 3.11.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Okta"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Okta Active Directory Agent versions 3.8.0 through 3.11.0 installed the Okta AD Agent Update Service using an unquoted path. Note: To remediate this vulnerability, you must uninstall Okta Active Directory Agent and reinstall Okta Active Directory Agent 3.12.0 or greater per the documentation."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Unquoted Search Path or Element"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://trust.okta.com/security-advisories/okta-active-directory-agent-cve-2022-1697",
              "refsource": "MISC",
              "url": "https://trust.okta.com/security-advisories/okta-active-directory-agent-cve-2022-1697"
            },
            {
              "name": "https://help.okta.com/en-us/Content/Topics/Directory/ad-agent-update.htm",
              "refsource": "MISC",
              "url": "https://help.okta.com/en-us/Content/Topics/Directory/ad-agent-update.htm"
            },
            {
              "name": "https://support.okta.com/help/s/article/Security-Notice-CVE-2022-1697-FAQ",
              "refsource": "MISC",
              "url": "https://support.okta.com/help/s/article/Security-Notice-CVE-2022-1697-FAQ"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "59b22baa-87b2-4371-8e4a-e080df12f74a",
    "assignerShortName": "Okta",
    "cveId": "CVE-2022-1697",
    "datePublished": "2022-09-06T17:18:50",
    "dateReserved": "2022-05-12T00:00:00",
    "dateUpdated": "2024-08-03T00:10:03.895Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-1030 (GCVE-0-2022-1030)

Vulnerability from cvelistv5 – Published: 2022-03-23 19:46 – Updated: 2024-08-02 23:47
VLAI?
Summary
Okta Advanced Server Access Client for Linux and macOS prior to version 1.58.0 was found to be vulnerable to command injection via a specially crafted URL. An attacker, who has knowledge of a valid team name for the victim and also knows a valid target host where the user has access, can execute commands on the local system.
Severity ?
No CVSS data available.
CWE
  • Command Injection
Assigner
References
Impacted products
Vendor Product Version
Okta Advanced Server Access Client Affected: Prior to version 1.58.0
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T23:47:43.281Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://trust.okta.com/security-advisories/okta-advanced-server-access-client-cve-2022-1030"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Advanced Server Access Client",
          "vendor": "Okta",
          "versions": [
            {
              "status": "affected",
              "version": "Prior to version 1.58.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Okta Advanced Server Access Client for Linux and macOS prior to version 1.58.0 was found to be vulnerable to command injection via a specially crafted URL. An attacker, who has knowledge of a valid team name for the victim and also knows a valid target host where the user has access, can execute commands on the local system."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Command Injection",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-03-23T19:46:14",
        "orgId": "59b22baa-87b2-4371-8e4a-e080df12f74a",
        "shortName": "Okta"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://trust.okta.com/security-advisories/okta-advanced-server-access-client-cve-2022-1030"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@okta.com",
          "ID": "CVE-2022-1030",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Advanced Server Access Client",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Prior to version 1.58.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Okta"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Okta Advanced Server Access Client for Linux and macOS prior to version 1.58.0 was found to be vulnerable to command injection via a specially crafted URL. An attacker, who has knowledge of a valid team name for the victim and also knows a valid target host where the user has access, can execute commands on the local system."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Command Injection"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://trust.okta.com/security-advisories/okta-advanced-server-access-client-cve-2022-1030",
              "refsource": "MISC",
              "url": "https://trust.okta.com/security-advisories/okta-advanced-server-access-client-cve-2022-1030"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "59b22baa-87b2-4371-8e4a-e080df12f74a",
    "assignerShortName": "Okta",
    "cveId": "CVE-2022-1030",
    "datePublished": "2022-03-23T19:46:14",
    "dateReserved": "2022-03-18T00:00:00",
    "dateUpdated": "2024-08-02T23:47:43.281Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-24295 (GCVE-0-2022-24295)

Vulnerability from cvelistv5 – Published: 2022-02-21 17:49 – Updated: 2024-08-03 04:07
VLAI?
Summary
Okta Advanced Server Access Client for Windows prior to version 1.57.0 was found to be vulnerable to command injection via a specially crafted URL.
Severity ?
No CVSS data available.
CWE
  • Code Execution
Assigner
References
Impacted products
Vendor Product Version
Okta Okta Advanced Server Access Client Affected: Prior to version 1.57.0
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T04:07:02.428Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://trust.okta.com/security-advisories/okta-advanced-server-access-client-cve-2022-24295"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Okta Advanced Server Access Client",
          "vendor": "Okta",
          "versions": [
            {
              "status": "affected",
              "version": "Prior to version 1.57.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Okta Advanced Server Access Client for Windows prior to version 1.57.0 was found to be vulnerable to command injection via a specially crafted URL."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Code Execution",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-21T17:49:31",
        "orgId": "59b22baa-87b2-4371-8e4a-e080df12f74a",
        "shortName": "Okta"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://trust.okta.com/security-advisories/okta-advanced-server-access-client-cve-2022-24295"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@okta.com",
          "ID": "CVE-2022-24295",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Okta Advanced Server Access Client",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Prior to version 1.57.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Okta"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Okta Advanced Server Access Client for Windows prior to version 1.57.0 was found to be vulnerable to command injection via a specially crafted URL."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Code Execution"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://trust.okta.com/security-advisories/okta-advanced-server-access-client-cve-2022-24295",
              "refsource": "MISC",
              "url": "https://trust.okta.com/security-advisories/okta-advanced-server-access-client-cve-2022-24295"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "59b22baa-87b2-4371-8e4a-e080df12f74a",
    "assignerShortName": "Okta",
    "cveId": "CVE-2022-24295",
    "datePublished": "2022-02-21T17:49:32",
    "dateReserved": "2022-02-01T00:00:00",
    "dateUpdated": "2024-08-03T04:07:02.428Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}