CVE-2023-6724

8.8 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass authorization controls in the Hearing Tracking System by manipulating user-controlled keys, enabling authentication abuse. It affects Hearing Tracking System versions before iOS 7.0 and the latest Android release 1.0.

💻 Affected Systems

Products:
  • Software Engineering Consultancy Machine Equipment Limited Company Hearing Tracking System
Versions: iOS: before 7.0, Android: latest release 1.0
Operating Systems: iOS, Android
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both mobile platforms; specific configuration details not provided in CVE description.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing unauthorized access to sensitive hearing data, potential data manipulation or deletion, and privilege escalation to administrative functions.

🟠

Likely Case

Unauthorized access to confidential hearing records and personal information, potentially violating privacy regulations and compromising case integrity.

🟢

If Mitigated

Limited impact with proper authentication and authorization controls, though some data exposure may still occur if other vulnerabilities exist.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some user interaction but leverages authorization bypass through controlled keys.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: iOS 7.0 or later, Android version after 1.0

Vendor Advisory: https://www.usom.gov.tr/bildirim/tr-24-0099

Restart Required: Yes

Instructions:

1. Update Hearing Tracking System app to iOS 7.0+ or latest Android version. 2. Restart the application after update. 3. Verify authorization controls are functioning properly.

🔧 Temporary Workarounds

Disable vulnerable versions

all

Remove or disable affected app versions from devices

adb uninstall com.company.hearingtracking
Remove app from iOS devices via MDM

Network segmentation

all

Restrict app network access to essential services only

🧯 If You Can't Patch

  • Implement strict network access controls and monitor for unauthorized access attempts
  • Enable detailed audit logging for all authentication and authorization events

🔍 How to Verify

Check if Vulnerable:

Check app version in settings: iOS version < 7.0 or Android version = 1.0 indicates vulnerability

Check Version:

iOS: Settings > General > About > Version; Android: Settings > Apps > Hearing Tracking System > App info

Verify Fix Applied:

Verify app version is iOS ≥ 7.0 or Android > 1.0, then test authorization controls with different user roles

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authorization attempts followed by successful access
  • Unusual user privilege changes
  • Access to unauthorized resources

Network Indicators:

  • Unusual API calls to authorization endpoints
  • Suspicious parameter manipulation in requests

SIEM Query:

source="hearing_tracking" AND (event_type="auth_bypass" OR status="unauthorized_access")

🔗 References

📤 Share & Export