Vulnerabilities (Page 58)

Duo Two-factor Authentication Bypass

Two 2FA bypassing, one based on auth state not being tied to the user’s session, the other involved swapping a transaction id to trick the server into thinking the attacker’s 2FA acceptance was the victim’s.