CVE-2023-45559

8.2 HIGH

📋 TL;DR

CVE-2023-45559 is a vulnerability in Tamaki_hamanoki Line v.13.6.1 where attackers can leak the channel access token and send crafted notifications. This allows unauthorized notification delivery to affected systems. Users of Tamaki_hamanoki Line v.13.6.1 are impacted.

💻 Affected Systems

Products:
  • Tamaki_hamanoki Line
Versions: v.13.6.1
Operating Systems: Unknown
Default Config Vulnerable: ⚠️ Yes
Notes: Specific configurations may vary, but default setups are vulnerable due to the token leakage issue.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could send malicious notifications to all users, potentially leading to phishing, malware distribution, or service disruption.

🟠

Likely Case

Unauthorized parties send spam or misleading notifications to users through the compromised channel.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to minor notification spam with no data breach.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation involves crafting notifications after token leakage, which is straightforward once the token is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: http://tamakihamanoki.com

Restart Required: No

Instructions:

Check vendor advisory for updates; no specific patching steps available yet.

🔧 Temporary Workarounds

Restrict Access to Channel Tokens

all

Limit access to channel access tokens to authorized personnel only.

Monitor Notification Activity

all

Implement logging and alerts for unusual notification patterns.

🧯 If You Can't Patch

  • Isolate the affected system from the internet to reduce attack surface.
  • Implement network segmentation to limit potential lateral movement.

🔍 How to Verify

Check if Vulnerable:

Check if using Tamaki_hamanoki Line v.13.6.1; review logs for unauthorized notification attempts.

Check Version:

Check application documentation or settings for version information.

Verify Fix Applied:

Verify by updating to a patched version if available and testing notification functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual notification spikes
  • Failed authentication attempts for channel tokens

Network Indicators:

  • Unexpected outbound notifications to unknown endpoints

SIEM Query:

Search for 'notification' events with high frequency from unauthorized sources.

🔗 References

📤 Share & Export