Meta fixes bug that can bypass Facebook 2FA

Share post:

Meta has fixed a Facebook vulnerability that could have allowed an attacker to bypass SMS-based two-factor authentication (2FA). The bug, which earned its discoverer a $27,200 bounty, accomplished this by confirming the targeted user’s already-verified Facebook mobile number via Instagram’s Meta Accounts Center.

Gtm Mänôz, the researcher, discovered that a user could link their Instagram and Facebook accounts by entering an already proven mobile number associated with the Facebook account. After entering the user’s mobile number, Facebook generates a one-time code to verify the user’s identity.

Users could add their email and phone number to both their Instagram and linked Facebook accounts, which could then be verified via a six-digit code sent via email or SMS. Any random six digits can, however, be entered and the request intercepted using a web proxy such as Burp Suite.

The issue on Instagram’s endpoint, on the other hand, could enable a threat actor to push infinite bot traffic to introduce a brute-force attack to verify a one-time Facebook PIN to link the accounts, successfully circumventing Facebook’s 2FA protections.

When the attacker correctly entered the code, the victim’s phone number was linked to the attacker’s Facebook account. A successful attack would still result in Meta sending a message to the victim stating that their two-factor authentication had been disabled because their phone number had been linked to someone else’s account.

The sources for this piece include an article in TechCrunch.

Featured Tech Jobs


Related articles

The US government and Its Microsoft dependency: A cybersecurity dilemma

Microsoft's series of high-profile cybersecurity failures has once again spotlighted the complex relationship between the tech giant and...

Cyber Security Today, Week in Review for week ending Friday, April 12, 2024

This episode features a discussion on Microsoft's cybersecurity troubles, worries about open source, a warning about abusing IT help desks to launch attack

Cyber Security Today, April 12, 2024 – A warning to Sisense customers, a new tactic for spreading the Raspberry Robin worm, and more

A warning to Sisense customers, a new tactic for spreading the Raspberry Robin worm, and more. Welcome to Cyber Security Today. It’s Friday April 12th, 2024. I’m Howard Solomon. Organizations that use products from business analytics provider Sisense [SI-SENSE] are being told to reset user login credentials and digital keys. The warning comes from the

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways