LinOTP is prone to a replay attack with activated automatic resynchronization. This vulnerability may allow an attacker to successfully log in with OTP values recorded at a previous point in time.
This attack is only possible if automatic resynchronization is enabled for the TOTP token type. The automatic resynchronization is deactivated by default. All other tokens are unaffected.
{ "nvd_published_at": "2019-06-27T14:15:00Z", "cwe_ids": [ "CWE-294" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2024-04-29T09:47:34Z" }