CVE-2023-34923

8.1 HIGH

📋 TL;DR

This vulnerability allows attackers with valid Identity Provider credentials to impersonate any TOPdesk user by manipulating SAML responses through XML Signature Wrapping. It affects organizations using TOPdesk's SAML-based Single Sign-on feature. Attackers can bypass authentication controls to gain unauthorized access to user accounts.

💻 Affected Systems

Products:
  • TOPdesk
Versions: v12.10.12 and earlier versions with SAML SSO enabled
Operating Systems: All platforms running TOPdesk
Default Config Vulnerable: ✅ No
Notes: Only affects systems with SAML-based Single Sign-on feature enabled. Systems using other authentication methods are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all TOPdesk user accounts, allowing attackers to access sensitive data, modify configurations, and perform administrative actions as any user.

🟠

Likely Case

Targeted account takeover where attackers impersonate specific users to access confidential information or perform unauthorized actions within the system.

🟢

If Mitigated

Limited impact if proper network segmentation, monitoring, and multi-factor authentication are implemented, though authentication bypass remains possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires valid Identity Provider credentials and understanding of SAML/XML manipulation. Public technical details available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v12.10.13 or later

Vendor Advisory: https://my.topdesk.com/tas/public/ssp/content/detail/knowledgeitem?unid=56a16ba1c2824e9a82655892ba75d3c0

Restart Required: Yes

Instructions:

1. Backup your TOPdesk instance. 2. Download and install TOPdesk v12.10.13 or later from the vendor portal. 3. Apply the update following vendor instructions. 4. Restart the TOPdesk service. 5. Verify SAML SSO functionality.

🔧 Temporary Workarounds

Disable SAML SSO

all

Temporarily disable the SAML-based Single Sign-on feature until patching is complete

Navigate to TOPdesk administration panel > Authentication > SSO settings > Disable SAML

Implement SAML Response Validation

all

Add additional validation of SAML responses at the application level

Consult TOPdesk documentation for custom SAML validation configuration

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to TOPdesk SAML endpoints
  • Enable detailed logging and monitoring of all authentication attempts and SAML responses

🔍 How to Verify

Check if Vulnerable:

Check if TOPdesk version is v12.10.12 or earlier and SAML SSO is enabled in administration settings

Check Version:

Check TOPdesk version in administration panel or via 'Help > About' in the interface

Verify Fix Applied:

Verify TOPdesk version is v12.10.13 or later and test SAML authentication functionality

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed SAML authentication attempts followed by successful login from unusual locations
  • SAML responses with unexpected XML structure or duplicate elements
  • User logins from IP addresses not associated with their normal patterns

Network Indicators:

  • Unusual SAML response sizes or structures in network traffic
  • SAML assertions containing wrapped or duplicated signature elements

SIEM Query:

source="topdesk" AND (event_type="authentication" AND result="success") AND (saml_response_size > threshold OR user_agent="unusual")

🔗 References

📤 Share & Export