CVE-2024-39891: n/a
In the Twilio Authy API, accessed by Authy Android before 25.1.0 and Authy iOS before 26.1.0, an unauthenticated endpoint provided access to certain phone-number data, as exploited in the wild in June 2024. Specifically, the endpoint accepted a stream of requests containing phone numbers, and responded with information about whether each phone number was registered with Authy. (Authy accounts were not compromised, however.)
AI Analysis
Technical Summary
CVE-2024-39891 is a vulnerability in the Twilio Authy API that affects Android versions prior to 25.1.0 and iOS versions prior to 26.1.0. The flaw lies in an unauthenticated API endpoint that accepts a stream of phone numbers and responds with information indicating whether each number is registered with Authy. This endpoint does not require authentication or user interaction, allowing remote attackers to enumerate registered users by submitting lists of phone numbers. Although the vulnerability does not expose sensitive account credentials or allow direct account compromise, it leaks user registration status, which can be leveraged for targeted phishing, social engineering, or further reconnaissance. The vulnerability was actively exploited in the wild as of June 2024, demonstrating its practical impact. The weakness corresponds to CWE-203 (Information Exposure Through Discrepancy). The CVSS v3.1 base score is 5.3, reflecting a medium severity due to the confidentiality impact and ease of exploitation. No patches are explicitly linked in the provided data, but updating to Authy Android 25.1.0+ and iOS 26.1.0+ versions is recommended. The vulnerability affects all users of the vulnerable Authy app versions globally, with no requirement for authentication or user interaction, increasing the attack surface. The scope is limited to information disclosure without integrity or availability impact.
Potential Impact
For European organizations, the primary impact is the exposure of whether specific phone numbers are registered with Authy, which could facilitate targeted social engineering, phishing campaigns, or reconnaissance activities against employees or customers. While no direct account compromise occurs, attackers can use this information to craft more convincing attacks or identify users of two-factor authentication services, potentially undermining security postures. Organizations relying on Authy for multi-factor authentication (MFA) may see increased risk of targeted attacks exploiting this leaked information. The vulnerability does not affect the integrity or availability of systems but compromises confidentiality to a moderate degree. This could lead to reputational damage if attackers leverage the data for successful attacks. The exploitation ease and lack of authentication requirements increase the likelihood of scanning and enumeration attacks. European entities with large user bases or high-value targets may be more attractive to attackers leveraging this vulnerability.
Mitigation Recommendations
1. Immediately update Authy Android clients to version 25.1.0 or later and iOS clients to version 26.1.0 or later to ensure the vulnerable endpoint is no longer accessible. 2. Monitor network traffic and logs for unusual patterns of API requests that may indicate enumeration attempts, such as high volumes of phone number queries. 3. Implement rate limiting and anomaly detection on API endpoints to detect and block mass enumeration attempts if you operate services integrating with Authy. 4. Educate users and employees about phishing and social engineering risks, emphasizing vigilance even if MFA is in use. 5. Consider additional layers of authentication or verification for sensitive operations beyond relying solely on Authy registration status. 6. Coordinate with Twilio support or security teams for any additional patches or mitigations if applicable. 7. Review and update incident response plans to address potential phishing or social engineering attacks leveraging leaked registration data.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2024-39891: n/a
Description
In the Twilio Authy API, accessed by Authy Android before 25.1.0 and Authy iOS before 26.1.0, an unauthenticated endpoint provided access to certain phone-number data, as exploited in the wild in June 2024. Specifically, the endpoint accepted a stream of requests containing phone numbers, and responded with information about whether each phone number was registered with Authy. (Authy accounts were not compromised, however.)
AI-Powered Analysis
Technical Analysis
CVE-2024-39891 is a vulnerability in the Twilio Authy API that affects Android versions prior to 25.1.0 and iOS versions prior to 26.1.0. The flaw lies in an unauthenticated API endpoint that accepts a stream of phone numbers and responds with information indicating whether each number is registered with Authy. This endpoint does not require authentication or user interaction, allowing remote attackers to enumerate registered users by submitting lists of phone numbers. Although the vulnerability does not expose sensitive account credentials or allow direct account compromise, it leaks user registration status, which can be leveraged for targeted phishing, social engineering, or further reconnaissance. The vulnerability was actively exploited in the wild as of June 2024, demonstrating its practical impact. The weakness corresponds to CWE-203 (Information Exposure Through Discrepancy). The CVSS v3.1 base score is 5.3, reflecting a medium severity due to the confidentiality impact and ease of exploitation. No patches are explicitly linked in the provided data, but updating to Authy Android 25.1.0+ and iOS 26.1.0+ versions is recommended. The vulnerability affects all users of the vulnerable Authy app versions globally, with no requirement for authentication or user interaction, increasing the attack surface. The scope is limited to information disclosure without integrity or availability impact.
Potential Impact
For European organizations, the primary impact is the exposure of whether specific phone numbers are registered with Authy, which could facilitate targeted social engineering, phishing campaigns, or reconnaissance activities against employees or customers. While no direct account compromise occurs, attackers can use this information to craft more convincing attacks or identify users of two-factor authentication services, potentially undermining security postures. Organizations relying on Authy for multi-factor authentication (MFA) may see increased risk of targeted attacks exploiting this leaked information. The vulnerability does not affect the integrity or availability of systems but compromises confidentiality to a moderate degree. This could lead to reputational damage if attackers leverage the data for successful attacks. The exploitation ease and lack of authentication requirements increase the likelihood of scanning and enumeration attacks. European entities with large user bases or high-value targets may be more attractive to attackers leveraging this vulnerability.
Mitigation Recommendations
1. Immediately update Authy Android clients to version 25.1.0 or later and iOS clients to version 26.1.0 or later to ensure the vulnerable endpoint is no longer accessible. 2. Monitor network traffic and logs for unusual patterns of API requests that may indicate enumeration attempts, such as high volumes of phone number queries. 3. Implement rate limiting and anomaly detection on API endpoints to detect and block mass enumeration attempts if you operate services integrating with Authy. 4. Educate users and employees about phishing and social engineering risks, emphasizing vigilance even if MFA is in use. 5. Consider additional layers of authentication or verification for sensitive operations beyond relying solely on Authy registration status. 6. Coordinate with Twilio support or security teams for any additional patches or mitigations if applicable. 7. Review and update incident response plans to address potential phishing or social engineering attacks leveraging leaked registration data.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-07-02T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f7d9b3247d717aace26a5c
Added to database: 10/21/2025, 7:06:27 PM
Last enriched: 10/21/2025, 7:41:20 PM
Last updated: 10/29/2025, 11:59:28 PM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62257: CWE-307 Improper Restriction of Excessive Authentication Attempts in Liferay Portal
MediumCVE-2025-9954: CWE-862 Missing Authorization in Drupal Acquia DAM
UnknownCVE-2025-12466: CWE-288 Authentication Bypass Using an Alternate Path or Channel in Drupal Simple OAuth (OAuth2) & OpenID Connect
UnknownCVE-2025-12083: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal CivicTheme Design System
UnknownCVE-2025-12082: CWE-863 Incorrect Authorization in Drupal CivicTheme Design System
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.