Critical 2FA Phone Number Auto-Enablement Flaw in Instagram Multi-Account Setup
Summary
While testing Instagram’s mobile app, I discovered a serious vulnerability in how the platform handles multi-account creation. Instagram silently enables SMS-based two-factor authentication (2FA) on a newly created account by reusing a previously verified phone number—without requesting any verification code or user consent.
How I Found the Issue
-
Logged into Account A with SMS-based 2FA and authenticator app enabled.
-
Within the same app session, used Add Account → Create New Account option.
-
Created Account B using the same Gmail address as Account A.
-
Navigated to Settings → Security → Two-Factor Authentication → Text Message on Account B.
-
Noticed that the phone number from Account A was already linked, and SMS 2FA was enabled without any OTP prompt or verification.
Expected vs Actual Behavior
Feature | Expected Behavior | Actual Behavior |
---|---|---|
2FA Setup | Instagram should prompt to verify phone via OTP for Account B. | SMS-based 2FA enabled silently, no verification requested. |
Phone Verification | Each account should verify its phone number independently. | Phone number from Account A reused without verification. |
User Consent | User should manually approve any security-related setup. | No user action or notification; setup happened in background. |
Steps to Reproduce
-
Log into Account A on Instagram and enable SMS-based 2FA.
-
While still logged in, go to Add Account → Create New Account.
-
Create Account B using the same Gmail address as Account A.
-
After setup, go to Settings → Security → Two-Factor Authentication → Text Message on Account B.
-
Observe that the phone number from Account A is present and SMS 2FA is enabled automatically—without OTP verification.
Security and Privacy Impact
-
Bypassing 2FA Verification: The core purpose of 2FA is compromised as verification is skipped entirely.
-
Cross-Account Phone Binding Without Consent: Phone numbers are sensitive data; linking them silently violates user consent and privacy principles.
-
Potential for Account Takeover: If an attacker gains access to your Gmail, they can create new Instagram accounts tied to your phone number without control of your device.
-
Silent Security Configuration: Users may remain unaware that SMS 2FA is enabled on additional accounts, leading to confusion or false trust in account security.
Why This Is Serious for Users and Businesses
Two-factor authentication is designed to protect accounts by requiring a second verification step, usually an OTP sent via SMS or generated by an authenticator app. The official, secure process involves:
-
Adding a phone number to the account.
-
Receiving an OTP on that phone number.
-
Entering the OTP to verify control of the phone.
-
Activating SMS-based 2FA only after successful verification.
Each account should independently verify its phone number. Sharing or reusing phone numbers silently across accounts breaks this isolation, undermines security, and violates user expectations.
For businesses and public figures, this vulnerability risks unwanted account linkage, impersonation, or coordinated social engineering attacks — potentially damaging reputation and security.
Comments
Post a Comment