CVE-2024-39891

5.3 MEDIUM CISA KEV - Actively Exploited
Published: July 02, 2024 Modified: November 05, 2025
View on NVD

Description

In the Twilio Authy API, accessed by Authy Android before 25.1.0 and Authy iOS before 26.1.0, an unauthenticated endpoint provided access to certain phone-number data, as exploited in the wild in June 2024. Specifically, the endpoint accepted a stream of requests containing phone numbers, and responded with information about whether each phone number was registered with Authy. (Authy accounts were not compromised, however.)

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://cwe.mitre.org/data/definitions/203.html
Source: cve@mitre.org
Technical Description
https://www.twilio.com/en-us/changelog
Source: cve@mitre.org
Release Notes
https://cwe.mitre.org/data/definitions/203.html
Source: af854a3a-2127-422b-91ae-364da2661108
Technical Description
https://www.twilio.com/docs/usage/security/reporting-vulnerabilities
Source: af854a3a-2127-422b-91ae-364da2661108
Product
https://www.twilio.com/en-us/changelog
Source: af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-39891
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
US Government Resource

9 reference(s) from NVD

Quick Stats

CVSS v3 Score
5.3 / 10.0
EPSS (Exploit Probability)
29.6%
97th percentile
Exploitation Status
Actively Exploited
Remediation due: 2024-08-13

Weaknesses (CWE)

Affected Vendors

twilio