CVE-2020-10554

7.5 HIGH

📋 TL;DR

Psyprax versions before 3.2.2 store encrypted data passwords in the database using weak obfuscation that can be easily reversed. This allows attackers with database access to recover encryption passwords and potentially decrypt sensitive data. Organizations using vulnerable Psyprax versions are affected.

💻 Affected Systems

Products:
  • Psyprax
Versions: All versions before 3.2.2
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All installations using the vulnerable password storage mechanism are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all encrypted data in the system, leading to exposure of sensitive information, potential regulatory violations, and loss of confidentiality.

🟠

Likely Case

Attackers with database access can decrypt stored sensitive data, potentially exposing user information, credentials, or other protected content.

🟢

If Mitigated

With proper access controls limiting database access, the impact is reduced to authorized users only, though the fundamental vulnerability remains.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires database access but the obfuscation reversal is trivial once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.2.2

Vendor Advisory: https://www.x41-dsec.de/lab/advisories/x41-2020-002-psyprax

Restart Required: Yes

Instructions:

1. Backup your Psyprax database and configuration. 2. Download and install Psyprax version 3.2.2 or later from the official source. 3. Follow the vendor's upgrade documentation. 4. Restart the Psyprax service. 5. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Database Access

all

Implement strict access controls to limit who can access the Psyprax database.

Encrypt Database at Rest

all

Use database-level encryption to protect stored data even if the obfuscated passwords are exposed.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Psyprax systems from untrusted networks
  • Enable comprehensive database auditing and monitoring for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check the Psyprax version number in the application interface or configuration files. Versions below 3.2.2 are vulnerable.

Check Version:

Check Psyprax web interface or configuration files for version information

Verify Fix Applied:

Verify the installed version is 3.2.2 or higher and check that password storage mechanism has been updated to proper encryption.

📡 Detection & Monitoring

Log Indicators:

  • Unusual database access patterns
  • Multiple failed authentication attempts to database
  • Unauthorized access to database tables containing password data

Network Indicators:

  • Unexpected database connections from unauthorized sources
  • Traffic patterns suggesting database enumeration

SIEM Query:

source="database_logs" AND (event="unauthorized_access" OR event="sensitive_data_access") AND application="Psyprax"

🔗 References

📤 Share & Export