{"vulnerability": "CVE-2024-45394", "sightings": [{"uuid": "9ce1d69d-024b-4f32-87bb-49f803b37121", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45394", "type": "seen", "source": "https://t.me/cvedetector/4723", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45394 - Authenticator AES Key Brute Force Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45394 \nPublished : Sept. 3, 2024, 9:15 p.m. | 44\u00a0minutes ago \nDescription : Authenticator is a browser extensions that generates two-step verification codes. In versions 7.0.0 and below, encryption keys for user data were stored encrypted at-rest using only AES-256 and the EVP_BytesToKey KDF. Therefore, attackers with a copy of a user's data are able to brute-force the user's encryption key. Users on version 8.0.0 and above are automatically migrated away from the weak encoding on first login. Users should destroy encrypted backups made with versions prior to 8.0.0. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-04T00:10:02.000000Z"}]}