CVE-2022-23610

9.1 CRITICAL

📋 TL;DR

This vulnerability allows attackers to bypass SAML SSO authentication in wire-server and impersonate any user with SAML credentials. It affects all wire-server instances prior to the 2022-01-27 release, enabling unauthorized access and potentially account creation in teams with SAML SSO enabled.

💻 Affected Systems

Products:
  • wire-server
Versions: All versions prior to 2022-01-27
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects instances with SAML SSO enabled. Requires attacker knowledge of SSO login code, SAML EntityID, and user SAML NameID.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of SAML-authenticated accounts, unauthorized access to sensitive communications, and creation of new malicious accounts in affected teams.

🟠

Likely Case

Targeted impersonation of specific users by attackers who can obtain the required SSO login code, EntityID, and NameID information.

🟢

If Mitigated

No impact if wire-server is updated to the patched version or if SAML SSO is disabled entirely.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires specific knowledge (SSO login code, EntityID, NameID) and ability to craft DSA signatures. The vulnerability is in an upstream SAML library.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2022-01-27

Vendor Advisory: https://github.com/wireapp/wire-server/security/advisories/GHSA-9jg9-9g37-4424

Restart Required: Yes

Instructions:

1. Update wire-server to version 2022-01-27 or later. 2. Restart the wire-server service. 3. Verify the update was successful.

🧯 If You Can't Patch

  • Disable SAML SSO authentication entirely
  • Enable SCIM provisioning if available to prevent new account creation

🔍 How to Verify

Check if Vulnerable:

Check wire-server version - if earlier than 2022-01-27 and SAML SSO is enabled, the system is vulnerable.

Check Version:

Check wire-server deployment configuration or container tags for version information.

Verify Fix Applied:

Confirm wire-server version is 2022-01-27 or later and test SAML authentication functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SAML authentication patterns
  • Multiple failed SAML attempts followed by successful logins from unexpected sources
  • New user creation via SAML when SCIM is disabled

Network Indicators:

  • SAML authentication requests with unusual signatures or public keys
  • Authentication from unexpected IP addresses

SIEM Query:

sourcetype=wire-server (saml_auth OR user_creation) | search status=success AND (unusual_ip OR multiple_attempts)

🔗 References

📤 Share & Export