CVE-2020-10552

8.1 HIGH

📋 TL;DR

This vulnerability allows any user to access the Psyprax Firebird database with default credentials (sysdba/masterke), enabling unauthorized reading and modification of all data including passwords. It affects Psyprax installations before version 3.2.2 where the database hasn't been properly secured.

💻 Affected Systems

Products:
  • Psyprax
Versions: All versions before 3.2.2
Operating Systems: Any OS running Psyprax
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerable in default installations where Firebird database credentials haven't been changed from defaults.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Psyprax system with attackers stealing all sensitive data, modifying records, and potentially using stolen credentials to access other systems.

🟠

Likely Case

Unauthorized access to sensitive patient/medical data, password theft, and data manipulation by local users or attackers who gain initial access.

🟢

If Mitigated

Limited impact if proper access controls, credential rotation, and network segmentation are implemented.

🌐 Internet-Facing: LOW (requires local access or initial compromise to exploit database files directly)
🏢 Internal Only: HIGH (any local user or compromised account can access the database with default credentials)

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access or ability to access database files. Credentials are well-known defaults.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.2.2

Vendor Advisory: https://www.x41-dsec.de/lab/advisories/x41-2020-002-psyprax

Restart Required: Yes

Instructions:

1. Upgrade Psyprax to version 3.2.2 or later. 2. Restart the Psyprax service. 3. Verify the Firebird database is no longer accessible with default credentials.

🔧 Temporary Workarounds

Change Firebird Database Credentials

all

Manually change the default sysdba password from 'masterke' to a strong, unique password

gsec -user sysdba -password masterke -modify sysdba -pw <new_strong_password>

Restrict Database File Access

linux

Set strict file permissions on Firebird database files to prevent unauthorized access

chmod 600 /path/to/psyprax.fdb
chown psyprax:psyprax /path/to/psyprax.fdb

🧯 If You Can't Patch

  • Immediately change the Firebird sysdba password from the default 'masterke' to a strong, unique password
  • Implement strict access controls and file permissions on database files, restricting access to only necessary service accounts

🔍 How to Verify

Check if Vulnerable:

Attempt to connect to the Firebird database using: isql -user sysdba -password masterke localhost:/path/to/psyprax.fdb. If connection succeeds, system is vulnerable.

Check Version:

Check Psyprax version in application interface or configuration files

Verify Fix Applied:

Attempt the same connection with default credentials - it should fail. Verify Psyprax version is 3.2.2 or later.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts to Firebird database
  • Unexpected database connections from unauthorized users

Network Indicators:

  • Unexpected connections to Firebird database port (default 3050)
  • Database access from unauthorized IPs

SIEM Query:

source="firebird.log" AND (event="authentication failure" OR event="connection from" NOT user="authorized_user")

🔗 References

📤 Share & Export