CVE-2024-8796

Publication date 17 September 2024

Last updated 3 July 2025


Ubuntu priority

Cvss 3 Severity Score

5.3 · Medium

Score breakdown

Under the default configuration, Devise-Two-Factor versions >= 2.2.0 & < 6.0.0 generate TOTP shared secrets that are 120 bits instead of the 128-bit minimum defined by RFC 4226. Using a shared secret shorter than the minimum to generate a multi-factor authentication code could make it easier for an attacker to guess the shared secret and generate valid TOTP codes.

Status

Package Ubuntu Release Status
ruby-devise-two-factor 25.04 plucky
Not affected
24.10 oracular
Not affected
24.04 LTS noble
Not affected
22.04 LTS jammy
Fixed 4.0.0-2ubuntu0.1~esm1
20.04 LTS focal
Fixed 3.1.0-2ubuntu0.1~esm1
16.04 LTS xenial
Vulnerable

Get expanded security coverage with Ubuntu Pro

Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.

Get Ubuntu Pro 30-day free trial

Severity score breakdown

Parameter Value
Base score 5.3 · Medium
Attack vector Network
Attack complexity High
Privileges required Low
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact None
Availability impact None
Vector CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

References

Related Ubuntu Security Notices (USN)

    • USN-7050-1
    • Devise-Two-Factor vulnerabilities
    • 1 October 2024

Other references