ZITADEL provides users the possibility to use Time-based One-Time-Password (TOTP) and One-Time-Password (OTP) through SMS and Email.
While ZITADEL already gives administrators the option to define a Lockout Policy with a maximum amount of failed password check attempts, there was no such mechanism for (T)OTP checks.
2.x versions are fixed on >= 2.50.0
There is no workaround since a patch is already available.
None
If you have any questions or comments about this advisory, please email us at security@zitadel.com
Thanks to Jack Moran from Layer 9 Information Security, Ethan from zxsecurity and Amit Laish from GE Vernova for finding and reporting the vulnerability.
{
"severity": "HIGH",
"cwe_ids": [
"CWE-287",
"CWE-297",
"CWE-307"
],
"nvd_published_at": "2024-04-26T00:15:08Z",
"github_reviewed_at": "2024-04-25T18:31:31Z",
"github_reviewed": true
}