CVE-2021-27491

7.5 HIGH

📋 TL;DR

The Ypsomed mylife Cloud and mobile application disclose password hashes during user registration. This vulnerability allows attackers to obtain password hashes that could be cracked offline, potentially compromising user accounts. All users of mylife Cloud versions prior to 1.7.2 and mylife Mobile Application versions prior to 1.7.5 are affected.

💻 Affected Systems

Products:
  • Ypsomed mylife Cloud
  • Ypsomed mylife Mobile Application
Versions: mylife Cloud: all versions prior to 1.7.2, mylife App: all versions prior to 1.7.5
Operating Systems: Android, iOS, Cloud platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both cloud service and mobile applications; registration process is vulnerable across all default configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain password hashes, crack them offline, gain unauthorized access to user accounts, and potentially access sensitive medical data or control medical devices.

🟠

Likely Case

Attackers harvest password hashes during registration, crack weak passwords, and compromise user accounts to access personal health information.

🟢

If Mitigated

With strong password policies and proper monitoring, impact is limited to potential exposure of hashed credentials requiring significant effort to crack.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires intercepting registration traffic or accessing registration endpoints; no authentication needed for registration process.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: mylife Cloud: 1.7.2+, mylife App: 1.7.5+

Vendor Advisory: https://us-cert.cisa.gov/ics/advisories/icsma-21-196-01

Restart Required: Yes

Instructions:

1. Update mylife Cloud to version 1.7.2 or later. 2. Update mylife Mobile Application to version 1.7.5 or later. 3. Restart services after update. 4. Force password resets for all users as precaution.

🔧 Temporary Workarounds

Disable new user registration

all

Temporarily disable new user registration to prevent hash disclosure during vulnerable registration process.

Implement network monitoring

all

Monitor registration endpoints for unusual traffic patterns or hash extraction attempts.

🧯 If You Can't Patch

  • Implement strong password policies requiring complex passwords that are resistant to hash cracking
  • Monitor registration endpoints and implement rate limiting to detect and prevent hash harvesting attempts

🔍 How to Verify

Check if Vulnerable:

Check application version: mylife Cloud < 1.7.2 or mylife App < 1.7.5. Monitor registration API responses for password hash disclosure.

Check Version:

Check app settings or about section for version information; cloud version typically shown in admin interface.

Verify Fix Applied:

Verify version is updated: mylife Cloud ≥ 1.7.2 and mylife App ≥ 1.7.5. Test registration process to confirm password hashes are no longer disclosed.

📡 Detection & Monitoring

Log Indicators:

  • Unusual registration attempts
  • Multiple registration requests from single IP
  • Registration API responses containing hash-like strings

Network Indicators:

  • HTTP traffic to registration endpoints containing hash values in responses
  • Unusual patterns in registration request volume

SIEM Query:

source="registration_api" AND (response_body CONTAINS "$2a$" OR response_body CONTAINS "$2y$" OR response_body CONTAINS "sha256$")

🔗 References

📤 Share & Export