CVE-2023-36647

7.5 HIGH

📋 TL;DR

CVE-2023-36647 is a critical authentication bypass vulnerability in ProLion CryptoSpike where a hard-coded private key allows attackers to forge JWT tokens. This enables complete impersonation of any user or role with administrative privileges. Organizations running vulnerable CryptoSpike versions are affected.

💻 Affected Systems

Products:
  • ProLion CryptoSpike
Versions: 3.0.15P2
Operating Systems: Not OS-specific - affects the application itself
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of the specified version are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the CryptoSpike system allowing attackers to impersonate administrators, access sensitive data, modify configurations, and potentially pivot to connected storage systems.

🟠

Likely Case

Attackers gain administrative access to the web management interface and REST API, enabling data exfiltration, configuration changes, and privilege escalation across the storage security environment.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the CryptoSpike management plane, though authentication bypass remains a critical issue.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only knowledge of the hard-coded key and basic JWT manipulation skills. No authentication needed to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Contact ProLion for patched version

Vendor Advisory: https://www.cvcn.gov.it/cvcn/cve/CVE-2023-36647

Restart Required: Yes

Instructions:

1. Contact ProLion support for patched version. 2. Backup current configuration. 3. Apply patch following vendor instructions. 4. Restart CryptoSpike services. 5. Verify new JWT keys are generated.

🔧 Temporary Workarounds

Network Isolation

all

Restrict access to CryptoSpike management interfaces to trusted IPs only

Use firewall rules to restrict access to CryptoSpike ports (typically 443/TCP)

API Rate Limiting

all

Implement rate limiting on REST API endpoints to detect brute force attempts

Configure web server or application firewall to limit requests per IP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate CryptoSpike from internet and untrusted networks
  • Deploy a WAF with JWT validation rules and anomaly detection for API endpoints

🔍 How to Verify

Check if Vulnerable:

Check CryptoSpike version via web interface or configuration files. If version is 3.0.15P2, system is vulnerable.

Check Version:

Check web interface or consult ProLion documentation for version check command

Verify Fix Applied:

Verify new JWT tokens are being signed with unique, non-hardcoded keys. Test authentication with invalid tokens to ensure they are rejected.

📡 Detection & Monitoring

Log Indicators:

  • Failed JWT validations with invalid signatures
  • Multiple authentication attempts from single source
  • Administrative actions from unusual IPs

Network Indicators:

  • Unusual API call patterns
  • Authentication requests bypassing normal login flow
  • JWT tokens with identical signatures

SIEM Query:

source="cryptospike" AND (event_type="auth_failure" OR event_type="admin_action") | stats count by src_ip

🔗 References

📤 Share & Export