CVE-2023-48055

7.5 HIGH

📋 TL;DR

SuperAGI v0.0.13 uses a hardcoded encryption key, making all encrypted data vulnerable to decryption by attackers. This affects anyone using this version of SuperAGI, potentially exposing sensitive information and communications.

💻 Affected Systems

Products:
  • SuperAGI
Versions: v0.0.13
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of v0.0.13 are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all encrypted data including sensitive configurations, API keys, and user communications leading to data breaches and unauthorized access to integrated systems.

🟠

Likely Case

Attackers decrypt stored sensitive data and intercept communications, gaining access to confidential information and potentially escalating privileges.

🟢

If Mitigated

Limited exposure if encryption is only used for non-sensitive data and proper network segmentation prevents external access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The hardcoded key is publicly documented, making exploitation trivial for anyone with access to encrypted data.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

Upgrade to a version that implements proper key management. Check SuperAGI repository for security updates.

🔧 Temporary Workarounds

Implement custom encryption key

all

Replace hardcoded key with a securely generated and managed encryption key

# Modify SuperAGI source code to use environment variable for key
# export SUPERAGI_ENCRYPTION_KEY='your-secure-key-here'

Disable vulnerable encryption functions

all

Temporarily disable encryption features until proper fix is available

# Comment out or remove encryption function calls in SuperAGI code

🧯 If You Can't Patch

  • Isolate SuperAGI instances from internet and restrict network access
  • Monitor for unusual decryption attempts and review all encrypted data for signs of compromise

🔍 How to Verify

Check if Vulnerable:

Check SuperAGI version and review source code for hardcoded encryption keys in cryptographic functions.

Check Version:

# Check SuperAGI version
python -c "import superagi; print(superagi.__version__)"

Verify Fix Applied:

Verify that encryption operations now use properly managed keys (environment variables, key management services) instead of hardcoded values.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed decryption attempts
  • Unusual access patterns to encrypted data stores
  • Log entries showing encryption/decryption operations with unexpected keys

Network Indicators:

  • Traffic patterns indicating data exfiltration from SuperAGI instances
  • Unencrypted transmission of sensitive data that should be encrypted

SIEM Query:

source="superagi" AND (event_type="decryption" OR event_type="encryption") AND key="hardcoded_key_value"

🔗 References

📤 Share & Export