CVE-2022-2193

7.5 HIGH

📋 TL;DR

This CVE describes an Insecure Direct Object Reference vulnerability in HYPR Server that allows authenticated attackers to add FIDO2 authenticators to arbitrary user accounts via parameter tampering. Attackers can compromise authentication security by registering their own authenticators to other users' accounts. This affects HYPR Server versions before 6.14.1.

💻 Affected Systems

Products:
  • HYPR Server
Versions: All versions prior to 6.14.1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the Device Manager page. All deployments with affected versions are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover of any user in the system, allowing attackers to authenticate as any user and access their resources and privileges.

🟠

Likely Case

Targeted account compromise of specific users, potentially leading to unauthorized access to sensitive systems and data.

🟢

If Mitigated

Limited impact with proper authentication monitoring and multi-factor authentication controls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but involves simple parameter manipulation. The vulnerability is straightforward to exploit once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.14.1

Vendor Advisory: https://www.hypr.com/security-advisories/

Restart Required: Yes

Instructions:

1. Backup current configuration and data. 2. Download HYPR Server version 6.14.1 or later from official sources. 3. Follow HYPR's upgrade documentation for your deployment type. 4. Restart the HYPR Server service. 5. Verify the upgrade was successful.

🔧 Temporary Workarounds

Restrict Device Manager Access

all

Limit access to the Device Manager page to only necessary administrative users through network controls or application permissions.

Enhanced Authentication Monitoring

all

Implement additional monitoring for FIDO2 authenticator registration events and alert on suspicious activity.

🧯 If You Can't Patch

  • Implement strict access controls to limit which users can access the Device Manager functionality
  • Deploy additional authentication verification steps for FIDO2 authenticator registration

🔍 How to Verify

Check if Vulnerable:

Check HYPR Server version via admin interface or configuration files. If version is below 6.14.1, the system is vulnerable.

Check Version:

Check HYPR admin dashboard or configuration files for version information specific to your deployment.

Verify Fix Applied:

Verify HYPR Server version is 6.14.1 or higher and test that parameter tampering in Device Manager no longer allows adding authenticators to arbitrary accounts.

📡 Detection & Monitoring

Log Indicators:

  • Multiple FIDO2 authenticator registration events from single user
  • Authenticator registration events for users from unexpected IP addresses or locations
  • Rapid succession of authenticator registration attempts

Network Indicators:

  • Unusual patterns of requests to Device Manager endpoints
  • Parameter manipulation attempts in Device Manager API calls

SIEM Query:

source="hypr-server" AND (event_type="authenticator_registration" OR endpoint="/device-manager") | stats count by user, src_ip

🔗 References

📤 Share & Export