Nov. 27, 2023, 4:16 p.m. | Jimi Sebree

Tenable Research Advisories www.tenable.com

Control iD iDSecure passwordCustom Authentication Bypass

An authentication bypass vulnerability exists in Control iD iDSecure v4.7.32.0. The login routine used by iDS-Core.dll contains a "passwordCustom" option that allows an unauthenticated attacker to compute valid credentials that can be used to bypass authentication and act as an administrative user.

iDS-Core.dll!ControliD.iDSecure.Tools.ServerJWT.Login() allows login via "passwordCustom":
       public LoginResult Login(LoginRequest client)
       {
[...]
               if (client.passwordCustom == null)
               {
[...]
               }
               else
               {
                   if (!(client.passwordCustom == Operators.DesbloqueioGerenciador(ServerJWT.Serial, client.passwordRandom)))
                   {
                       throw new DALException(Localization.Translate("InvalidPassword"));
                   }
                   operators = …

act attacker authentication authentication bypass bypass bypass vulnerability compute control credentials dll ids idsecure login public tools unauthenticated valid vulnerability

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC