Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-39891: n/a

0
Medium
VulnerabilityCVE-2024-39891cvecve-2024-39891
Published: Tue Jul 02 2024 (07/02/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

In the Twilio Authy API, accessed by Authy Android before 25.1.0 and Authy iOS before 26.1.0, an unauthenticated endpoint provided access to certain phone-number data, as exploited in the wild in June 2024. Specifically, the endpoint accepted a stream of requests containing phone numbers, and responded with information about whether each phone number was registered with Authy. (Authy accounts were not compromised, however.)

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 04:37:32 UTC

Technical Analysis

CVE-2024-39891 is a vulnerability in the Twilio Authy API affecting Authy Android versions prior to 25.1.0 and iOS versions prior to 26.1.0. The issue stems from an unauthenticated API endpoint that accepts a stream of phone numbers and responds with data indicating whether each number is registered with Authy. This endpoint does not require authentication or user interaction, allowing remote attackers to enumerate registered phone numbers. While the vulnerability does not expose account credentials or allow account takeover, it leaks sensitive metadata about user registration status. This information can be exploited by attackers for social engineering, targeted phishing, or to prioritize targets for further attacks. The vulnerability corresponds to CWE-203, which involves information exposure through discrepancies in system behavior. The flaw was actively exploited in the wild as of June 2024, indicating real-world risk. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the limited impact on confidentiality without affecting integrity or availability. No patches or mitigations were listed at the time of disclosure, but updating Authy to versions 25.1.0 (Android) and 26.1.0 (iOS) or later is expected to resolve the issue.

Potential Impact

The primary impact of CVE-2024-39891 is the unauthorized disclosure of whether specific phone numbers are registered with the Authy two-factor authentication service. This leakage of user registration data compromises confidentiality but does not directly affect the integrity or availability of Authy accounts or services. However, the exposed information can facilitate targeted social engineering, phishing campaigns, or reconnaissance by attackers seeking to identify users who rely on Authy for authentication. Organizations using Authy for securing sensitive accounts may face increased risk of targeted attacks against their employees or customers. The vulnerability's ease of exploitation—requiring no authentication or user interaction—amplifies its threat potential. While no direct account compromise has been reported, the information disclosure could be a stepping stone for more sophisticated attacks. The impact is especially significant for organizations with high-value targets or those in sectors where phone-based authentication is prevalent.

Mitigation Recommendations

To mitigate CVE-2024-39891, organizations and users should promptly update Authy Android clients to version 25.1.0 or later and Authy iOS clients to version 26.1.0 or later, where the vulnerability has been addressed. Network-level controls such as rate limiting and anomaly detection on API endpoints can help detect and block suspicious enumeration attempts. Organizations should monitor logs for unusual patterns of phone number queries against Authy services. Employing additional layers of authentication beyond phone number verification can reduce the risk posed by this information disclosure. Security teams should educate users about phishing and social engineering risks that may arise from leaked registration data. Finally, Twilio should be engaged to confirm patch availability and ensure secure API endpoint configurations to prevent unauthenticated access.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-07-02T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9b3247d717aace26a5c

Added to database: 10/21/2025, 7:06:27 PM

Last enriched: 2/28/2026, 4:37:32 AM

Last updated: 3/25/2026, 2:57:24 AM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses