CVE-2023-26576

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to extract sensitive student data from IDAttend's IDWeb application by exploiting missing authentication in the SearchStudentsRFID method. It affects organizations using IDWeb version 3.1.052 and earlier. The vulnerability exposes personally identifiable information (PII) of students without requiring any credentials.

💻 Affected Systems

Products:
  • IDAttend IDWeb
Versions: 3.1.052 and earlier
Operating Systems: Windows (presumed based on typical deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with the vulnerable version are affected as this is an authentication bypass in core functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Mass exfiltration of all student PII including names, RFID data, and potentially other sensitive information, leading to privacy violations, identity theft risks, and regulatory compliance failures.

🟠

Likely Case

Targeted extraction of student data by opportunistic attackers scanning for vulnerable systems, resulting in limited data breaches and potential privacy violations.

🟢

If Mitigated

No data exposure if proper network segmentation and authentication controls prevent unauthenticated access to the vulnerable endpoint.

🌐 Internet-Facing: HIGH - The vulnerability allows unauthenticated access, making internet-facing instances immediately vulnerable to scanning and exploitation.
🏢 Internal Only: MEDIUM - Internal systems are still vulnerable but require network access; risk depends on internal network segmentation and monitoring.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and appears to be a simple API endpoint with missing auth checks, making exploitation trivial for attackers who discover the endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 3.1.053 or later

Vendor Advisory: https://www.themissinglink.com.au/security-advisories/cve-2023-26576

Restart Required: Yes

Instructions:

1. Download the latest version from IDAttend vendor. 2. Backup current installation and data. 3. Install the updated version. 4. Restart the IDWeb application service. 5. Verify authentication is required for SearchStudentsRFID endpoint.

🔧 Temporary Workarounds

Network Access Control

all

Restrict network access to IDWeb application to authorized users only using firewall rules or network segmentation.

Web Application Firewall Rule

all

Block unauthenticated requests to the SearchStudentsRFID endpoint using WAF rules.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the IDWeb application from untrusted networks
  • Deploy a reverse proxy with authentication requirements for all requests to the vulnerable endpoint

🔍 How to Verify

Check if Vulnerable:

Attempt to access the SearchStudentsRFID API endpoint without authentication; if it returns student data, the system is vulnerable.

Check Version:

Check the IDWeb application version in the admin interface or application files (typically in web.config or similar configuration files).

Verify Fix Applied:

Attempt the same unauthenticated access to SearchStudentsRFID endpoint; it should return an authentication error or no data.

📡 Detection & Monitoring

Log Indicators:

  • Unusual volume of requests to SearchStudentsRFID endpoint
  • Requests to SearchStudentsRFID from unauthenticated sessions or unexpected IP addresses

Network Indicators:

  • HTTP GET/POST requests to /SearchStudentsRFID or similar endpoint without authentication headers

SIEM Query:

source="idweb_logs" AND (uri="*SearchStudentsRFID*" OR endpoint="*SearchStudentsRFID*") AND (user="-" OR auth_status="failed" OR session_id="")

🔗 References

📤 Share & Export