CVE-2024-31695: n/a
A misconfiguration in the fingerprint authentication mechanism of Binance: BTC, Crypto and NFTS v2.85.4, allows attackers to bypass authentication when adding a new fingerprint.
AI Analysis
Technical Summary
CVE-2024-31695 is a critical security vulnerability identified in the Binance: BTC, Crypto and NFTS mobile application, specifically version 2.85.4. The vulnerability arises from a misconfiguration in the fingerprint authentication mechanism, which is intended to provide biometric security for user authentication. This flaw allows an attacker to bypass the fingerprint authentication process when adding a new fingerprint to the device or app, effectively circumventing security controls without requiring any privileges, user interaction, or prior authentication. The vulnerability is classified under CWE-863 (Incorrect Authorization), indicating that the application fails to properly enforce authorization checks during fingerprint enrollment. The CVSS v3.1 base score is 9.8 (critical), reflecting the vulnerability's high impact on confidentiality, integrity, and availability, combined with its ease of remote exploitation (attack vector: network, no privileges or user interaction needed). Although no public exploits have been reported yet, the severity and nature of the flaw make it a prime target for attackers aiming to gain unauthorized access to cryptocurrency wallets and NFT assets managed via the app. The lack of available patches or mitigations from the vendor at the time of publication further exacerbates the risk. This vulnerability threatens the security of users' digital assets and could lead to theft, unauthorized transactions, and loss of trust in the platform.
Potential Impact
The impact of CVE-2024-31695 is severe for organizations and individual users relying on the Binance app for cryptocurrency and NFT management. Successful exploitation enables attackers to bypass biometric authentication controls, granting unauthorized access to user accounts and wallets. This can lead to theft of cryptocurrencies, unauthorized transfers, and compromise of sensitive personal and financial data. The integrity of transactions and availability of user accounts are also at risk, potentially causing financial losses and service disruptions. For organizations, this vulnerability could undermine customer trust, lead to regulatory scrutiny, and cause reputational damage. Given the critical nature of the flaw and the high value of assets managed through the app, the threat poses a significant risk to the global cryptocurrency ecosystem. The absence of known exploits in the wild currently provides a limited window for proactive defense, but the ease of exploitation and high impact necessitate urgent attention.
Mitigation Recommendations
To mitigate the risks posed by CVE-2024-31695, users and organizations should take immediate and specific actions beyond generic advice: 1) Temporarily disable fingerprint authentication within the Binance app until a vendor patch is released. 2) Use strong alternative authentication methods such as multi-factor authentication (MFA) with hardware tokens or authenticator apps. 3) Monitor account activity closely for any unauthorized access or suspicious transactions and enable transaction alerts. 4) Restrict app permissions and avoid using the app on devices that are not fully secured or updated. 5) Educate users about the risk and encourage them to report any anomalies promptly. 6) Follow Binance’s official channels for updates and apply security patches immediately once available. 7) Consider using hardware wallets or cold storage solutions for high-value assets to reduce exposure. 8) Implement network-level protections such as IP whitelisting and anomaly detection for organizational accounts. These targeted measures will help reduce the attack surface and protect assets until the vulnerability is fully remediated.
Affected Countries
United States, South Korea, Germany, Singapore, United Kingdom, Japan, Canada, Australia, India, Brazil
CVE-2024-31695: n/a
Description
A misconfiguration in the fingerprint authentication mechanism of Binance: BTC, Crypto and NFTS v2.85.4, allows attackers to bypass authentication when adding a new fingerprint.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-31695 is a critical security vulnerability identified in the Binance: BTC, Crypto and NFTS mobile application, specifically version 2.85.4. The vulnerability arises from a misconfiguration in the fingerprint authentication mechanism, which is intended to provide biometric security for user authentication. This flaw allows an attacker to bypass the fingerprint authentication process when adding a new fingerprint to the device or app, effectively circumventing security controls without requiring any privileges, user interaction, or prior authentication. The vulnerability is classified under CWE-863 (Incorrect Authorization), indicating that the application fails to properly enforce authorization checks during fingerprint enrollment. The CVSS v3.1 base score is 9.8 (critical), reflecting the vulnerability's high impact on confidentiality, integrity, and availability, combined with its ease of remote exploitation (attack vector: network, no privileges or user interaction needed). Although no public exploits have been reported yet, the severity and nature of the flaw make it a prime target for attackers aiming to gain unauthorized access to cryptocurrency wallets and NFT assets managed via the app. The lack of available patches or mitigations from the vendor at the time of publication further exacerbates the risk. This vulnerability threatens the security of users' digital assets and could lead to theft, unauthorized transactions, and loss of trust in the platform.
Potential Impact
The impact of CVE-2024-31695 is severe for organizations and individual users relying on the Binance app for cryptocurrency and NFT management. Successful exploitation enables attackers to bypass biometric authentication controls, granting unauthorized access to user accounts and wallets. This can lead to theft of cryptocurrencies, unauthorized transfers, and compromise of sensitive personal and financial data. The integrity of transactions and availability of user accounts are also at risk, potentially causing financial losses and service disruptions. For organizations, this vulnerability could undermine customer trust, lead to regulatory scrutiny, and cause reputational damage. Given the critical nature of the flaw and the high value of assets managed through the app, the threat poses a significant risk to the global cryptocurrency ecosystem. The absence of known exploits in the wild currently provides a limited window for proactive defense, but the ease of exploitation and high impact necessitate urgent attention.
Mitigation Recommendations
To mitigate the risks posed by CVE-2024-31695, users and organizations should take immediate and specific actions beyond generic advice: 1) Temporarily disable fingerprint authentication within the Binance app until a vendor patch is released. 2) Use strong alternative authentication methods such as multi-factor authentication (MFA) with hardware tokens or authenticator apps. 3) Monitor account activity closely for any unauthorized access or suspicious transactions and enable transaction alerts. 4) Restrict app permissions and avoid using the app on devices that are not fully secured or updated. 5) Educate users about the risk and encourage them to report any anomalies promptly. 6) Follow Binance’s official channels for updates and apply security patches immediately once available. 7) Consider using hardware wallets or cold storage solutions for high-value assets to reduce exposure. 8) Implement network-level protections such as IP whitelisting and anomaly detection for organizational accounts. These targeted measures will help reduce the attack surface and protect assets until the vulnerability is fully remediated.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-04-05T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6dd5b7ef31ef0b58f080
Added to database: 2/25/2026, 9:47:01 PM
Last enriched: 2/26/2026, 12:26:55 PM
Last updated: 4/12/2026, 7:54:54 AM
Views: 21
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.