<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Token Reusage — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/token-reusage/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 18 May 2026 15:37:43 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/token-reusage/feed.xml" rel="self" type="application/rss+xml"/><item><title>eduMFA Token Reusage Vulnerability due to Incorrect InnoDB Snapshot Isolation</title><link>https://feed.craftedsignal.io/briefs/2026-05-edumfa-token-reusage/</link><pubDate>Mon, 18 May 2026 15:37:43 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-edumfa-token-reusage/</guid><description>eduMFA versions prior to 2.9.1 are vulnerable to token reusage due to incorrect InnoDB snapshot isolation in MySQL and MariaDB versions prior to 11.6.2 (or newer with innodb_snapshot_isolation=off), affecting token types such as TOTP, HOTP, and likely WebAuthN, where tokens are intended for single use, requiring racing the transaction for exploitation.</description><content:encoded><![CDATA[<p>A vulnerability exists in eduMFA versions prior to 2.9.1 related to the handling of transaction isolation within the database layer. Specifically, when eduMFA is deployed with MySQL or MariaDB versions prior to 11.6.2 (or newer versions with <code>innodb_snapshot_isolation</code> explicitly set to OFF), it is possible for attackers to reuse token values due to faulty transaction isolation. This is because the database might not properly serialize token usage, allowing multiple requests to validate the same token before it is invalidated. The affected token types include TOTP, HOTP, and potentially WebAuthN, all of which rely on single-use tokens. Exploitation requires racing conditions. The vulnerability was addressed in eduMFA version 2.9.1.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>User initiates a multi-factor authentication process.</li>
<li>eduMFA generates a time-based or counter-based one-time password (TOTP or HOTP).</li>
<li>The token and associated user data are written to the database.</li>
<li>Attacker initiates multiple authentication requests using the same token value in rapid succession.</li>
<li>Due to incorrect InnoDB snapshot isolation, multiple authentication requests may read the same uncommitted token value from the database before it is invalidated by the first successful authentication.</li>
<li>The database validates the token for each of the attacker&rsquo;s requests, as the isolation level does not prevent concurrent reads before write.</li>
<li>If the race succeeds, multiple authentication sessions are established using the same token.</li>
<li>The attacker gains unauthorized access to the user&rsquo;s account.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to bypass multi-factor authentication and gain unauthorized access to user accounts. This could lead to data breaches, account compromise, and other malicious activities. The number of potentially affected users depends on the deployment size of eduMFA and the number of users relying on TOTP, HOTP or WebAuthN for authentication. Sectors that rely on eduMFA for authentication are potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade eduMFA to version 2.9.1 to apply the fix that locks rows prior to write with SELECT FOR UPDATE.</li>
<li>If upgrading is not immediately feasible, set <code>innodb_snapshot_isolation</code> to ON in MariaDB configurations (default in MariaDB &gt;= 11.6.2) as a workaround.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>vulnerability</category><category>mfa</category><category>token reusage</category></item></channel></rss>