CVE-2023-31923

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers with 'User Operator' privileges in Suprema BioStar 2 to create new user accounts with full administrator privileges due to missing server-side validation. This affects all Suprema BioStar 2 systems before the 2022 Q4 update. Attackers can escalate privileges from limited user access to complete system control.

💻 Affected Systems

Products:
  • Suprema BioStar 2
Versions: All versions before 2022 Q4 update (specifically before v2.9.1)
Operating Systems: Windows-based systems running BioStar 2
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations with 'User Operator' role enabled. The vulnerability exists in the web application component of BioStar 2.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where attackers gain full administrative control, can modify all user permissions, disable security features, access sensitive biometric data, and potentially pivot to other systems.

🟠

Likely Case

Privilege escalation leading to unauthorized administrative access, allowing attackers to create backdoor accounts, modify access controls, and potentially exfiltrate sensitive biometric and access data.

🟢

If Mitigated

Limited impact if proper access controls and monitoring are in place, with attackers only able to create accounts but being detected through audit logs before causing significant damage.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with 'User Operator' privileges. The vulnerability is well-documented with public proof-of-concept available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2.9.1 (2022 Q4 update)

Vendor Advisory: https://www.supremainc.com/en/support/notice_view.asp?idx=1234&page=1&search=&searchstring=

Restart Required: Yes

Instructions:

1. Backup current configuration and database. 2. Download and install BioStar 2 v2.9.1 from Suprema support portal. 3. Apply the update package. 4. Restart the BioStar 2 service. 5. Verify all user permissions are correctly configured post-update.

🔧 Temporary Workarounds

Restrict User Operator Privileges

all

Temporarily remove or restrict 'User Operator' role assignments until patching can be completed.

Navigate to BioStar 2 Admin Panel > User Management > Edit User Roles > Remove 'User Operator' from all non-essential accounts

Implement Network Segmentation

all

Restrict access to BioStar 2 web interface to only authorized administrative networks.

Configure firewall rules to limit BioStar 2 web interface access to specific IP ranges

🧯 If You Can't Patch

  • Implement strict monitoring of user creation events and privilege changes in audit logs
  • Regularly review and audit all user accounts with administrative privileges

🔍 How to Verify

Check if Vulnerable:

Check BioStar 2 version in Admin Panel > System Information. If version is below 2.9.1, system is vulnerable.

Check Version:

Check version in BioStar 2 web interface under System Information or via command line: sc query "BioStar 2 Service"

Verify Fix Applied:

After updating to v2.9.1, attempt to create a user with 'User Operator' privileges and verify you cannot assign administrator permissions.

📡 Detection & Monitoring

Log Indicators:

  • Unusual user creation events from 'User Operator' accounts
  • Privilege escalation attempts in user management logs
  • Multiple administrator account creations in short timeframes

Network Indicators:

  • HTTP POST requests to user creation endpoints from non-admin accounts
  • Unusual authentication patterns to administrative interfaces

SIEM Query:

source="biostar_logs" AND (event_type="user_creation" AND user_role="administrator" AND source_user_role="operator")

🔗 References

📤 Share & Export