CVE-2025-26788

8.4 HIGH

📋 TL;DR

This vulnerability in StrongKey FIDO Server allows authentication bypass by incorrectly treating non-discoverable credential flows as discoverable transactions. Attackers could potentially authenticate as legitimate users without proper credentials. Organizations using StrongKey FIDO Server versions before 4.15.1 for passkey authentication are affected.

💻 Affected Systems

Products:
  • StrongKey FIDO Server
Versions: All versions before 4.15.1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments using named credential (non-discoverable) flows. Discoverable credential flows are not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete authentication bypass allowing unauthorized access to protected systems and data, potentially leading to account takeover and privilege escalation.

🟠

Likely Case

Authentication bypass enabling unauthorized access to applications relying on StrongKey FIDO Server for passkey authentication.

🟢

If Mitigated

Limited impact if proper network segmentation, monitoring, and multi-factor authentication are in place.

🌐 Internet-Facing: HIGH - Authentication bypass vulnerabilities in internet-facing authentication servers are critical attack vectors.
🏢 Internal Only: MEDIUM - Internal authentication bypass still poses significant risk for lateral movement and privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of FIDO2 protocol and access to authentication endpoints. No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.15.1

Vendor Advisory: https://docs.strongkey.com/index.php/skfs-v3/skfs-release-notes

Restart Required: No

Instructions:

1. Download StrongKey FIDO Server version 4.15.1 or later. 2. Follow standard upgrade procedures for your deployment. 3. Verify the upgrade completed successfully. 4. Test authentication flows to ensure proper functionality.

🔧 Temporary Workarounds

Disable non-discoverable credential flows

all

Temporarily disable named credential (non-discoverable) authentication flows until patching can be completed.

Configuration changes in StrongKey FIDO Server settings to disable non-discoverable credential support

🧯 If You Can't Patch

  • Implement additional authentication layers (MFA) for all users
  • Restrict network access to StrongKey FIDO Server endpoints

🔍 How to Verify

Check if Vulnerable:

Check StrongKey FIDO Server version. If version is below 4.15.1, the system is vulnerable.

Check Version:

Check server version through admin interface or configuration files

Verify Fix Applied:

Verify version is 4.15.1 or higher and test authentication flows to ensure proper credential type handling.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns
  • Multiple failed authentication attempts followed by success
  • Authentication from unexpected locations

Network Indicators:

  • Unusual traffic patterns to FIDO authentication endpoints
  • Authentication requests with malformed credential types

SIEM Query:

source="strongkey-fido" AND (event_type="authentication" AND result="success") AND credential_type="named"

🔗 References

📤 Share & Export