In the Twilio Authy API, accessed by Authy Android before 25.1.0 and Authy iOS before 26.1.0, an unauthenticated endpoint provided access to certain phone-number data, as exploited in the wild in June 2024. Specifically, the endpoint accepted a stream of requests containing phone numbers, and responded with information about whether each phone number was registered with Authy. (Authy accounts were not compromised, however.)
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 22 Oct 2025 08:30:00 +0900


Wed, 22 Oct 2025 05:30:00 +0900


Wed, 22 Oct 2025 04:30:00 +0900


Wed, 30 Jul 2025 11:15:00 +0900

Type Values Removed Values Added
First Time appeared Twilio authy 2-factor Authentication
CPEs cpe:2.3:a:twilio:authy_2-factor_authentication:*:*:*:*:*:*:*:*
Vendors & Products Twilio authy 2-factor Authentication
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-10-21T22:55:50.240Z

Reserved: 2024-07-02T00:00:00.000Z

Link: CVE-2024-39891

cve-icon Vulnrichment

Updated: 2024-08-02T04:33:11.402Z

cve-icon NVD

Status : Analyzed

Published: 2024-07-02T18:15:03.447

Modified: 2025-11-05T19:11:21.007

Link: CVE-2024-39891

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses