CVE-2022-2193
📋 TL;DR
This CVE describes an Insecure Direct Object Reference vulnerability in HYPR Server that allows authenticated attackers to add FIDO2 authenticators to arbitrary user accounts via parameter tampering. Attackers can compromise authentication security by registering their own authenticators to other users' accounts. This affects HYPR Server versions before 6.14.1.
💻 Affected Systems
- HYPR Server
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete account takeover of any user in the system, allowing attackers to authenticate as any user and access their resources and privileges.
Likely Case
Targeted account compromise of specific users, potentially leading to unauthorized access to sensitive systems and data.
If Mitigated
Limited impact with proper authentication monitoring and multi-factor authentication controls in place.
🎯 Exploit Status
Exploitation requires authenticated access but involves simple parameter manipulation. The vulnerability is straightforward to exploit once authenticated.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 6.14.1
Vendor Advisory: https://www.hypr.com/security-advisories/
Restart Required: Yes
Instructions:
1. Backup current configuration and data. 2. Download HYPR Server version 6.14.1 or later from official sources. 3. Follow HYPR's upgrade documentation for your deployment type. 4. Restart the HYPR Server service. 5. Verify the upgrade was successful.
🔧 Temporary Workarounds
Restrict Device Manager Access
allLimit access to the Device Manager page to only necessary administrative users through network controls or application permissions.
Enhanced Authentication Monitoring
allImplement additional monitoring for FIDO2 authenticator registration events and alert on suspicious activity.
🧯 If You Can't Patch
- Implement strict access controls to limit which users can access the Device Manager functionality
- Deploy additional authentication verification steps for FIDO2 authenticator registration
🔍 How to Verify
Check if Vulnerable:
Check HYPR Server version via admin interface or configuration files. If version is below 6.14.1, the system is vulnerable.
Check Version:
Check HYPR admin dashboard or configuration files for version information specific to your deployment.
Verify Fix Applied:
Verify HYPR Server version is 6.14.1 or higher and test that parameter tampering in Device Manager no longer allows adding authenticators to arbitrary accounts.
📡 Detection & Monitoring
Log Indicators:
- Multiple FIDO2 authenticator registration events from single user
- Authenticator registration events for users from unexpected IP addresses or locations
- Rapid succession of authenticator registration attempts
Network Indicators:
- Unusual patterns of requests to Device Manager endpoints
- Parameter manipulation attempts in Device Manager API calls
SIEM Query:
source="hypr-server" AND (event_type="authenticator_registration" OR endpoint="/device-manager") | stats count by user, src_ip