CVE-2024-39891: n/a
In the Twilio Authy API, accessed by Authy Android before 25.1.0 and Authy iOS before 26.1.0, an unauthenticated endpoint provided access to certain phone-number data, as exploited in the wild in June 2024. Specifically, the endpoint accepted a stream of requests containing phone numbers, and responded with information about whether each phone number was registered with Authy. (Authy accounts were not compromised, however.)
AI Analysis
Technical Summary
CVE-2024-39891 is a vulnerability in the Twilio Authy API affecting Authy Android versions prior to 25.1.0 and iOS versions prior to 26.1.0. The issue stems from an unauthenticated API endpoint that accepts a stream of phone numbers and responds with data indicating whether each number is registered with Authy. This endpoint does not require authentication or user interaction, allowing remote attackers to enumerate registered phone numbers. While the vulnerability does not expose account credentials or allow account takeover, it leaks sensitive metadata about user registration status. This information can be exploited by attackers for social engineering, targeted phishing, or to prioritize targets for further attacks. The vulnerability corresponds to CWE-203, which involves information exposure through discrepancies in system behavior. The flaw was actively exploited in the wild as of June 2024, indicating real-world risk. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the limited impact on confidentiality without affecting integrity or availability. No patches or mitigations were listed at the time of disclosure, but updating Authy to versions 25.1.0 (Android) and 26.1.0 (iOS) or later is expected to resolve the issue.
Potential Impact
The primary impact of CVE-2024-39891 is the unauthorized disclosure of whether specific phone numbers are registered with the Authy two-factor authentication service. This leakage of user registration data compromises confidentiality but does not directly affect the integrity or availability of Authy accounts or services. However, the exposed information can facilitate targeted social engineering, phishing campaigns, or reconnaissance by attackers seeking to identify users who rely on Authy for authentication. Organizations using Authy for securing sensitive accounts may face increased risk of targeted attacks against their employees or customers. The vulnerability's ease of exploitation—requiring no authentication or user interaction—amplifies its threat potential. While no direct account compromise has been reported, the information disclosure could be a stepping stone for more sophisticated attacks. The impact is especially significant for organizations with high-value targets or those in sectors where phone-based authentication is prevalent.
Mitigation Recommendations
To mitigate CVE-2024-39891, organizations and users should promptly update Authy Android clients to version 25.1.0 or later and Authy iOS clients to version 26.1.0 or later, where the vulnerability has been addressed. Network-level controls such as rate limiting and anomaly detection on API endpoints can help detect and block suspicious enumeration attempts. Organizations should monitor logs for unusual patterns of phone number queries against Authy services. Employing additional layers of authentication beyond phone number verification can reduce the risk posed by this information disclosure. Security teams should educate users about phishing and social engineering risks that may arise from leaked registration data. Finally, Twilio should be engaged to confirm patch availability and ensure secure API endpoint configurations to prevent unauthenticated access.
Affected Countries
United States, India, United Kingdom, Germany, Canada, Australia, France, Brazil, Japan, South Korea
CVE-2024-39891: n/a
Description
In the Twilio Authy API, accessed by Authy Android before 25.1.0 and Authy iOS before 26.1.0, an unauthenticated endpoint provided access to certain phone-number data, as exploited in the wild in June 2024. Specifically, the endpoint accepted a stream of requests containing phone numbers, and responded with information about whether each phone number was registered with Authy. (Authy accounts were not compromised, however.)
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-39891 is a vulnerability in the Twilio Authy API affecting Authy Android versions prior to 25.1.0 and iOS versions prior to 26.1.0. The issue stems from an unauthenticated API endpoint that accepts a stream of phone numbers and responds with data indicating whether each number is registered with Authy. This endpoint does not require authentication or user interaction, allowing remote attackers to enumerate registered phone numbers. While the vulnerability does not expose account credentials or allow account takeover, it leaks sensitive metadata about user registration status. This information can be exploited by attackers for social engineering, targeted phishing, or to prioritize targets for further attacks. The vulnerability corresponds to CWE-203, which involves information exposure through discrepancies in system behavior. The flaw was actively exploited in the wild as of June 2024, indicating real-world risk. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the limited impact on confidentiality without affecting integrity or availability. No patches or mitigations were listed at the time of disclosure, but updating Authy to versions 25.1.0 (Android) and 26.1.0 (iOS) or later is expected to resolve the issue.
Potential Impact
The primary impact of CVE-2024-39891 is the unauthorized disclosure of whether specific phone numbers are registered with the Authy two-factor authentication service. This leakage of user registration data compromises confidentiality but does not directly affect the integrity or availability of Authy accounts or services. However, the exposed information can facilitate targeted social engineering, phishing campaigns, or reconnaissance by attackers seeking to identify users who rely on Authy for authentication. Organizations using Authy for securing sensitive accounts may face increased risk of targeted attacks against their employees or customers. The vulnerability's ease of exploitation—requiring no authentication or user interaction—amplifies its threat potential. While no direct account compromise has been reported, the information disclosure could be a stepping stone for more sophisticated attacks. The impact is especially significant for organizations with high-value targets or those in sectors where phone-based authentication is prevalent.
Mitigation Recommendations
To mitigate CVE-2024-39891, organizations and users should promptly update Authy Android clients to version 25.1.0 or later and Authy iOS clients to version 26.1.0 or later, where the vulnerability has been addressed. Network-level controls such as rate limiting and anomaly detection on API endpoints can help detect and block suspicious enumeration attempts. Organizations should monitor logs for unusual patterns of phone number queries against Authy services. Employing additional layers of authentication beyond phone number verification can reduce the risk posed by this information disclosure. Security teams should educate users about phishing and social engineering risks that may arise from leaked registration data. Finally, Twilio should be engaged to confirm patch availability and ensure secure API endpoint configurations to prevent unauthenticated access.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-07-02T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f7d9b3247d717aace26a5c
Added to database: 10/21/2025, 7:06:27 PM
Last enriched: 2/28/2026, 4:37:32 AM
Last updated: 3/25/2026, 2:57:24 AM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.