Security Notification # CSAL51


Advisory Title: OTP Bypass Possible

Document ID:

TAS/PRD/GEN/SN-CSAL#51

Document Name:

Security Notification # CSAL51

Doc. Rev.:

0









Publication Date

15-Jan-24

Incident Source

CSAL51

CVE / Vulnerability Reference

OWASP(A2)


Last Update

06-Feb-24

Reported By

Valency Networks Testing Agency

Advisory ID#

Posting Not Started Yet


Current Version

WP500 FW 0.6.6

CVSS Score

9.5











 Vulnerability Description

The report identifies a critical vulnerability in the One-Time Password (OTP) authentication mechanism used by our system. Specifically, the OTP validation process is executed on the client side rather than the server side. This flaw allows an attacker to bypass the OTP requirement by capturing a successful OTP response and then injecting it into a failure response scenario, enabling unauthorized access with a false or reused OTP. This vulnerability poses a significant risk to the integrity and security of our system, potentially compromising user accounts and sensitive data....

 Impact

The vulnerability was discovered during a routine security assessment by Valency Networks Testing. It involves the manipulation of the OTP validation mechanism, where the client-side application validates the OTP. Attackers can intercept the network traffic to capture a successful OTP validation response. This captured response can then be injected into the session of an OTP validation attempt that would otherwise fail due to an incorrect OTP. As a result, the system erroneously grants access based on the client-side validation, ignoring the critical step of server-side verification.

 Affected products

WP500 Firmware 0.65 Version





Temporary Fix / Mitigation

Please update to WebApp Version 2.0 to Solve this Problem.


Acknowledgment

Valency Networks , Pune





 History

NA





 Classification of Vulnerability

Authentication and Authorization.