CVE-2023-6336

7.2 HIGH

📋 TL;DR

This vulnerability allows attackers to manipulate symbolic links to access arbitrary files on macOS systems running vulnerable versions of HYPR Workforce Access. Attackers could potentially read, modify, or delete sensitive files by exploiting improper link resolution. This affects all macOS users running HYPR Workforce Access versions before 8.7.

💻 Affected Systems

Products:
  • HYPR Workforce Access
Versions: All versions before 8.7
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects macOS installations. Windows and Linux versions are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through privilege escalation, sensitive data exfiltration, or persistent backdoor installation via arbitrary file access.

🟠

Likely Case

Unauthorized access to sensitive configuration files, user credentials, or application data stored on the local system.

🟢

If Mitigated

Limited impact with proper file permissions and user privilege restrictions, potentially only allowing access to non-sensitive files.

🌐 Internet-Facing: MEDIUM - Requires user interaction or local access, but could be combined with other vulnerabilities for remote exploitation.
🏢 Internal Only: HIGH - Local attackers or malicious insiders could exploit this to escalate privileges or access sensitive data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local access or ability to influence file operations. Link following vulnerabilities are typically straightforward to exploit once the attack vector is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.7

Vendor Advisory: https://www.hypr.com/security-advisories

Restart Required: Yes

Instructions:

1. Download HYPR Workforce Access version 8.7 or later from official sources. 2. Stop the HYPR Workforce Access service. 3. Install the updated version. 4. Restart the service and verify functionality.

🔧 Temporary Workarounds

Restrict file permissions

macOS

Apply strict file permissions to sensitive directories and files that HYPR Workforce Access might access.

chmod 600 /path/to/sensitive/files
chown root:wheel /path/to/sensitive/files

Disable unnecessary features

all

Disable any non-essential file access features in HYPR Workforce Access configuration.

🧯 If You Can't Patch

  • Implement strict file system permissions and access controls to limit potential damage
  • Monitor for suspicious file access patterns and implement application whitelisting

🔍 How to Verify

Check if Vulnerable:

Check the installed version of HYPR Workforce Access via the application interface or system information.

Check Version:

Check application version in HYPR Workforce Access settings or via 'system_profiler SPApplicationsDataType' command

Verify Fix Applied:

Confirm version is 8.7 or later and test file access functionality to ensure proper link resolution.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns from HYPR processes
  • Multiple failed file access attempts
  • Access to sensitive system files by HYPR application

Network Indicators:

  • None - this is a local file system vulnerability

SIEM Query:

process.name:"HYPR Workforce Access" AND file.path:"/etc/*" OR file.path:"/var/*" OR file.path:"/Users/*/Library/*"

🔗 References

📤 Share & Export