TikTok 2FA Bypass via Third-Party Integration: A Critical Oversight I Discovered
Discovering a Two-Factor Authentication Bypass in TikTok’s Third-Party Login
While performing routine security testing, I found a critical vulnerability in TikTok’s authentication system that allows two-factor authentication (2FA) to be bypassed when logging in via third-party apps.
Description of the Issue
TikTok offers a “Sign in with TikTok” option that lets users access third-party apps like CapCut without entering separate credentials. However, I noticed that when using this method, the second step of verification—2FA—is completely skipped. Even if 2FA is enabled on the TikTok account, the login process through the third-party app never asks for the second authentication factor.
This effectively grants full access to the account with just a username and password, undermining the core security that 2FA is meant to provide.
Steps to Reproduce
-
Enable two-factor authentication on a TikTok account.
-
Use a third-party app, such as CapCut, that supports “Sign in with TikTok.”
-
Attempt to log in to TikTok through this third-party app.
-
Observe that the login proceeds without prompting for the 2FA code.
-
Notice full account access is granted, despite 2FA being enabled.
Security and Privacy Impact
This vulnerability presents serious risks:
-
Bypassing 2FA Protections: Attackers can log in without needing the second factor, increasing the chance of unauthorized account access.
-
Inconsistent Security Enforcement: Users expect 2FA to be enforced regardless of login method.
-
Exposure of Sensitive Data: High-profile users relying on 2FA for account security become vulnerable through third-party logins.
-
Potential Account Takeovers: Without the second factor, attackers can fully compromise accounts.
Business Impact
If this flaw is exploited, it could:
-
Damage TikTok’s reputation for account security.
-
Result in loss of user trust, especially among creators and influencers.
-
Lead to data breaches, account hijackings, and related financial or legal consequences.
Conclusion
Even though my report was marked as a duplicate, this issue underscores the importance of enforcing two-factor authentication consistently across all login pathways. Users expect that enabling 2FA means their accounts are protected no matter how they log in.
Security should be seamless and universal, not selectively applied. Addressing these inconsistencies is crucial to maintaining trust and safeguarding user data.
Comments
Post a Comment