The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2024-10327

CVE-2024-10327: Okta Verify iOS Auth Bypass Vulnerability

CVE-2024-10327 is an authentication bypass flaw in Okta Verify for iOS that allows push notifications to succeed regardless of user selection. This post covers the technical details, affected versions, impact, and mitigation.

Updated: January 22, 2026

CVE-2024-10327 Overview

A critical authentication bypass vulnerability has been identified in Okta Verify for iOS that allows push notification responses through the iOS ContextExtension feature to succeed regardless of the user's actual selection. When a user long-presses the notification banner and selects an option, both "Approve" and "Deny" options result in successful authentication, effectively bypassing the intended multi-factor authentication protection.

This vulnerability affects specific versions of Okta Verify for iOS and represents a significant security risk for organizations relying on Okta's push notification mechanism for multi-factor authentication.

Critical Impact

Attackers who have compromised user credentials can bypass MFA protection, as denying push notifications does not prevent authentication success.

Affected Products

  • Okta Verify for iOS version 9.25.1 (beta)
  • Okta Verify for iOS version 9.27.0 (including beta)
  • Users enrolled in Okta Verify while using Okta Classic (including those who have since upgraded to Okta Identity Engine)

Discovery Timeline

  • October 24, 2024 - CVE-2024-10327 published to NVD
  • October 25, 2024 - Last updated in NVD database

Technical Details for CVE-2024-10327

Vulnerability Analysis

This vulnerability is classified as CWE-287 (Improper Authentication) and affects the iOS ContextExtension feature within Okta Verify's push notification handling mechanism. The flaw occurs in the notification response processing logic, where the application fails to properly differentiate between approval and denial responses when using specific notification interaction methods.

The vulnerable flows include scenarios where users interact with notifications from a locked screen without unlocking the device, drag notifications down on the home screen to respond, or use an Apple Watch to reply directly to notifications. In all these cases, the underlying authentication request proceeds successfully regardless of whether the user selected "Approve" or "Deny."

A critical pre-condition for exploitation is that the affected user must have originally enrolled in Okta Verify while their organization was using Okta Classic infrastructure. This applies even if the organization has since migrated to Okta Identity Engine.

Root Cause

The root cause lies in improper handling of user responses within the iOS ContextExtension notification framework. The Okta Verify application fails to correctly propagate the user's denial selection to the authentication backend when notifications are handled through the ContextExtension pathway. This results in both positive and negative user responses being interpreted as authentication approvals.

Attack Vector

This vulnerability requires network access and user interaction to exploit. An attacker who has already obtained a victim's primary credentials (username and password) can initiate an authentication attempt, triggering a push notification to the victim's device. Even if the victim denies the authentication request through one of the vulnerable notification interaction methods, the authentication will succeed, granting the attacker access to the protected account.

The attack is particularly dangerous because:

  • The victim believes they have successfully blocked the unauthorized access attempt
  • No additional alerts or warnings are generated
  • The attacker gains full authenticated access despite the explicit denial

The vulnerability mechanism involves the iOS ContextExtension improperly processing the user's response selection. When a notification is interacted with via the vulnerable pathways (locked screen response, drag-down notification, or Apple Watch), the denial action fails to properly communicate with Okta's authentication servers, resulting in default approval behavior. For detailed technical information, refer to the Okta Security Advisory.

Detection Methods for CVE-2024-10327

Indicators of Compromise

  • Successful authentication events that occur shortly after a user reports denying an MFA push notification
  • Multiple consecutive push notification requests followed by successful logins from unusual geographic locations
  • Authentication success logs from devices where the user claims to have rejected the request
  • Unusual login patterns from accounts that use iOS devices with Okta Verify

Detection Strategies

  • Monitor Okta System Log for authentication events and correlate with user-reported MFA denials
  • Implement alerting for successful authentications from new locations or devices immediately following MFA push events
  • Review authentication logs for iOS clients using Okta Verify versions 9.25.1 and 9.27.0
  • Enable and review detailed MFA event logging to track push notification responses

Monitoring Recommendations

  • Deploy SentinelOne Singularity Identity to monitor for anomalous authentication patterns and detect potential MFA bypass attempts
  • Configure Okta to log detailed push notification response events for forensic analysis
  • Establish baseline user authentication behavior to detect deviations indicative of credential compromise with MFA bypass
  • Implement real-time alerting for authentication success events that match suspicious patterns

How to Mitigate CVE-2024-10327

Immediate Actions Required

  • Update Okta Verify for iOS to the latest patched version immediately
  • Notify users of affected iOS devices to update their Okta Verify application
  • Audit authentication logs for any suspicious activity during the period vulnerable versions were in use
  • Consider temporarily requiring additional authentication factors for high-risk users until patches are deployed

Patch Information

Okta has released security patches to address this vulnerability. Organizations should ensure all iOS devices running Okta Verify are updated to versions newer than 9.27.0. For detailed patch information and release notes, see the Okta Verify Release Notes and the Okta Security Advisory.

Workarounds

  • Instruct users to unlock their devices before responding to Okta Verify push notifications
  • Disable Apple Watch notifications for Okta Verify until the update is applied
  • Require users to open the Okta Verify app directly to respond to authentication requests rather than using notification shortcuts
  • Consider implementing number matching or biometric verification challenges as additional verification steps

For enterprise environments, mobile device management (MDM) solutions can be configured to enforce minimum app versions:

bash
# Example MDM policy configuration for enforcing minimum Okta Verify version
# Consult your MDM vendor documentation for specific implementation

# Block authentication from vulnerable Okta Verify versions
# Configure Okta Admin Console -> Security -> Device Trust policies
# Set minimum iOS app version requirement above 9.27.0

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechOkta Verify

  • SeverityHIGH

  • CVSS Score8.1

  • EPSS Probability0.10%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityHigh
  • AvailabilityNone
  • CWE References
  • CWE-287
  • Technical References
  • Okta Verify Release Notes

  • Okta Security Advisory CVE-2024-10327
  • Related CVEs
  • CVE-2024-0980: Okta Verify for Windows RCE Vulnerability

  • CVE-2024-7061: Okta Verify Privilege Escalation Flaw
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English