CVE-2023-36651

7.2 HIGH

📋 TL;DR

CVE-2023-36651 is a critical authentication bypass vulnerability in ProLion CryptoSpike 3.0.15P2 where hard-coded super-admin credentials allow remote attackers to gain full administrative access to the web management interface and REST API. This affects all organizations running the vulnerable version of CryptoSpike, a data security platform for storage systems. Attackers can completely compromise the system's security controls and access sensitive data.

💻 Affected Systems

Products:
  • ProLion CryptoSpike
Versions: 3.0.15P2
Operating Systems: Not OS-specific - runs as appliance/application
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of version 3.0.15P2 are vulnerable regardless of configuration. The hard-coded credentials are embedded in the software.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover allowing attackers to disable security controls, exfiltrate all protected data, manipulate encryption settings, and use the compromised system as a foothold into connected storage infrastructure.

🟠

Likely Case

Unauthorized administrative access leading to data theft, configuration changes, and potential ransomware deployment on protected storage systems.

🟢

If Mitigated

Limited impact if network segmentation prevents external access and internal monitoring detects unusual administrative activity.

🌐 Internet-Facing: HIGH - Web management interface with hard-coded credentials presents immediate remote exploitation risk.
🏢 Internal Only: HIGH - Even internally, any user with network access can exploit these credentials to gain super-admin privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only knowledge of the hard-coded credentials and network access to the management interface. No special tools or skills needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 3.0.15P2

Vendor Advisory: https://www.cvcn.gov.it/cvcn/cve/CVE-2023-36651

Restart Required: Yes

Instructions:

1. Contact ProLion support for updated version. 2. Backup current configuration. 3. Apply vendor-provided patch/upgrade. 4. Restart CryptoSpike services. 5. Verify new credentials are required for admin access.

🔧 Temporary Workarounds

Network Isolation

linux

Restrict access to CryptoSpike management interface to only trusted administrative networks

firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="TRUSTED_IP" port protocol="tcp" port="443" accept'
firewall-cmd --reload

IP Whitelisting

linux

Configure web server to only allow connections from authorized administrative IP addresses

iptables -A INPUT -p tcp --dport 443 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Immediately change all passwords and API keys stored in CryptoSpike as they may have been compromised
  • Implement strict network segmentation to isolate CryptoSpike from internet and non-administrative networks

🔍 How to Verify

Check if Vulnerable:

Check CryptoSpike version via web interface or CLI. If version is 3.0.15P2, system is vulnerable.

Check Version:

Check web interface footer or run: cat /opt/cryptospike/version.txt

Verify Fix Applied:

Attempt to login with default/hard-coded credentials - should fail. Verify version is greater than 3.0.15P2.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful login from unusual IP
  • Administrative actions from non-standard user accounts or IPs
  • REST API calls with super-admin privileges from unexpected sources

Network Indicators:

  • HTTP POST requests to /api/login endpoint from unauthorized networks
  • Unusual volume of API calls to privileged endpoints
  • Connections to management interface from non-administrative subnets

SIEM Query:

source="cryptospike" (event_type="login_success" AND user="admin") OR (http_method="POST" AND uri_path="/api/*" AND src_ip NOT IN [admin_networks])

🔗 References

📤 Share & Export