HomeTwilioCVE-2024-39891

CVE-2024-39891

MEDIUM
5.3CVSS
Published: 2024-07-02
Updated: 2025-11-05
AI Analysis

Description

In the Twilio Authy API, accessed by Authy Android before 25.1.0 and Authy iOS before 26.1.0, an unauthenticated endpoint provided access to certain phone-number data, as exploited in the wild in June 2024. Specifically, the endpoint accepted a stream of requests containing phone numbers, and responded with information about whether each phone number was registered with Authy. (Authy accounts were not compromised, however.)

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Attack Vector
network
Complexity
low
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
low
Integrity
none
Availability
none
Weaknesses
CWE-203CWE-203

Metadata

Primary Vendor
TWILIO
Published
7/2/2024
Last Modified
11/5/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

twilio : authytwilio : authy_authenticator

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief