Description

Meta recently addressed a critical vulnerability discovered by cybersecurity researcher Samip Aryal, who discovered a flaw in Facebook's password reset process. Aryal, recognized as a top contributor to Facebook's bug bounty program for 2024, disclosed that the vulnerability allowed attackers to take control of any Facebook account. The flaw pertained to the six-digit unique authorization code sent to a different logged-in device during the password reset process. Analysis revealed that the authorization code remained active for approximately two hours without brute-force protection. Exploiting the vulnerability required only the knowledge of the targeted user's username, enabling attackers to use tools like Burp Suite for brute-forcing the code. Once obtained, attackers could reset the account's password or directly log into it. When exploited, Facebook notified the targeted user, either displaying the six-digit code or prompting the user to tap the notification to reveal it, potentially turning it into a one-click exploit. Aryal reported his findings to Meta on January 30, leading to the issue's prompt resolution by February 2. While the exact bug bounty amount received by Aryal remains undisclosed, it likely reflects the severity of the flaw. Meta's payout guidelines offer between $5,000 and $130,000 for account takeover exploits, depending on factors such as the impacted component and the number of clicks required to execute the exploit. While Aryal's exploit was categorized as a zero-click exploit, indicating maximum severity, Meta's response suggests that he did not receive the maximum bounty.