Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

CVE-2025-42615

Gravedad CVSS v4.0:
ALTA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
08/12/2025
Última modificación:
08/12/2025

Descripción

*** Pendiente de traducción *** In affected versions, vulnerability-lookup did not track or limit failed<br /> One-Time Password (OTP) attempts during Two-Factor Authentication (2FA)<br /> verification. An attacker who already knew or guessed a valid username <br /> and password could submit an arbitrary number of OTP codes without <br /> causing the account to be locked or generating any specific alert for <br /> administrators.<br /> <br /> <br /> This lack of rate-limiting and lockout on OTP failures significantly <br /> lowers the cost of online brute-force attacks against 2FA codes and <br /> increases the risk of successful account takeover, especially if OTP <br /> entropy is reduced (e.g. short numeric codes, user reuse, or predictable<br /> tokens). Additionally, administrators had no direct visibility into <br /> accounts experiencing repeated 2FA failures, making targeted attacks <br /> harder to detect and investigate.<br /> <br /> <br /> The patch introduces a persistent failed_otp_attempts counter on user <br /> accounts, locks the user after 5 invalid OTP submissions, resets the <br /> counter on successful verification, and surfaces failed 2FA attempts in <br /> the admin user list. This enforces an account lockout policy for OTP <br /> brute-force attempts and improves monitoring capabilities for suspicious<br /> 2FA activity.This issue affects Vulnerability-Lookup: before 2.18.0.

Referencias a soluciones, herramientas e información