Meta fixes bug that can bypass Facebook 2FA

Share post:

Meta has fixed a Facebook vulnerability that could have allowed an attacker to bypass SMS-based two-factor authentication (2FA). The bug, which earned its discoverer a $27,200 bounty, accomplished this by confirming the targeted user’s already-verified Facebook mobile number via Instagram’s Meta Accounts Center.

Gtm Mänôz, the researcher, discovered that a user could link their Instagram and Facebook accounts by entering an already proven mobile number associated with the Facebook account. After entering the user’s mobile number, Facebook generates a one-time code to verify the user’s identity.

Users could add their email and phone number to both their Instagram and linked Facebook accounts, which could then be verified via a six-digit code sent via email or SMS. Any random six digits can, however, be entered and the request intercepted using a web proxy such as Burp Suite.

The issue on Instagram’s endpoint, on the other hand, could enable a threat actor to push infinite bot traffic to introduce a brute-force attack to verify a one-time Facebook PIN to link the accounts, successfully circumventing Facebook’s 2FA protections.

When the attacker correctly entered the code, the victim’s phone number was linked to the attacker’s Facebook account. A successful attack would still result in Meta sending a message to the victim stating that their two-factor authentication had been disabled because their phone number had been linked to someone else’s account.

The sources for this piece include an article in TechCrunch.

SUBSCRIBE NOW

Related articles

Cyber Security Today, Week in Review for week ending Friday May 17, 2024

Welcome to Cyber Security Today. This is the Week in Review for the week ending Friday, May 17th,...

Cyber Security Today, May 17, 2024 – Malware hiding in Apache Tomcat servers

Malware hiding in Apache Tomcat servers, new backdoors found, and more Welcome to Cyber Security Today. It's Friday, May...

MIT students exploit blockchain vulnerability to steal 25 million dollars

Two MIT students have been implicated in a highly sophisticated cryptocurrency heist, where they reportedly exploited a vulnerability...

Cyber Security Today, May 15, 2024 – Ebury botnet still exploits Linux servers, Microsoft, SAP and Apple issue security updates

The Ebury botnet continues to exploit Linux servers, Microsoft, SAP and Apple issue security updates, and more. Welcome to...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways