CVE-2023-36655
📋 TL;DR
This vulnerability allows remote blocked users to bypass authentication in ProLion CryptoSpike when using LDAP/Active Directory. Attackers can obtain valid authentication tokens by manipulating username case sensitivity, enabling unauthorized access to protected systems. Organizations using CryptoSpike 3.0.15P2 with LDAP/AD authentication are affected.
💻 Affected Systems
- ProLion CryptoSpike
📦 What is this software?
Cryptospike by Prolion
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise where attackers gain administrative access, exfiltrate sensitive data, deploy ransomware, or disrupt critical infrastructure operations.
Likely Case
Unauthorized access to protected files and systems, data theft, privilege escalation, and lateral movement within the network.
If Mitigated
Limited impact with proper network segmentation, strong monitoring, and multi-factor authentication preventing full exploitation.
🎯 Exploit Status
Exploitation requires knowledge of blocked usernames but is technically simple - just changing case combinations in login attempts.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.0.16 or later
Vendor Advisory: https://prolion.com/cryptospike/
Restart Required: Yes
Instructions:
1. Download latest CryptoSpike version from ProLion support portal. 2. Backup current configuration. 3. Install update following vendor documentation. 4. Restart CryptoSpike services. 5. Verify authentication works correctly.
🔧 Temporary Workarounds
Switch to Local Authentication
allTemporarily disable LDAP/AD authentication and use local user accounts until patched.
Network Access Control
allRestrict access to CryptoSpike login API to trusted IP ranges only.
🧯 If You Can't Patch
- Implement strict network segmentation to isolate CryptoSpike from critical systems
- Enable detailed authentication logging and monitor for case variation login attempts
🔍 How to Verify
Check if Vulnerable:
Test authentication with known blocked usernames using different case combinations (e.g., 'Admin', 'ADMIN', 'admin'). If any variation succeeds, system is vulnerable.
Check Version:
Check CryptoSpike web interface or run 'cryptospike --version' on the server
Verify Fix Applied:
After patching, repeat case variation tests with blocked users - all should be rejected. Verify version is 3.0.16 or higher.
📡 Detection & Monitoring
Log Indicators:
- Multiple failed login attempts with same username but different case
- Successful logins from previously blocked users
- Authentication logs showing case-insensitive username matching
Network Indicators:
- Unusual authentication traffic patterns
- Login attempts from unexpected locations
SIEM Query:
source="cryptospike" AND (event_type="authentication" AND (username MATCHES /[a-zA-Z]+/i) AND status="success") | stats count by username, src_ip