<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Bypass — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/bypass/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 30 Apr 2026 18:20:02 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/bypass/feed.xml" rel="self" type="application/rss+xml"/><item><title>Clerk Authorization Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-clerk-auth-bypass/</link><pubDate>Thu, 30 Apr 2026 18:20:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-clerk-auth-bypass/</guid><description>Clerk has an authorization bypass vulnerability in multiple packages where the `has()` and `auth.protect()` predicates can incorrectly return true, potentially allowing unauthorized actions.</description><content:encoded><![CDATA[<p>A critical authorization bypass vulnerability has been identified in Clerk&rsquo;s authorization predicates (<code>has()</code> and <code>auth.protect()</code>) across multiple SDKs, including <code>@clerk/shared</code>, <code>@clerk/nextjs</code>, and <code>@clerk/backend</code>. This flaw, reported on April 18, 2026, and patched on April 22, 2026, can lead to incorrect authorization decisions when combining multiple authorization dimensions (e.g., reverification with role). Specifically, the predicates may return <code>true</code> even if the user does not satisfy all required conditions, potentially allowing unauthorized access to gated actions. A secondary bypass exists in <code>@clerk/nextjs</code>, where <code>auth.protect()</code> silently discards authorization parameters under certain conditions. The vulnerability affects applications using specific combinations of authorization checks, emphasizing the need for immediate patching.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an application utilizing affected Clerk packages and vulnerable authorization checks.</li>
<li>The attacker targets an endpoint protected by a combined authorization check (e.g., requiring a specific role and reverification).</li>
<li>The attacker crafts a request that satisfies one, but not all, of the authorization conditions.</li>
<li>Due to the bypass vulnerability, the <code>has()</code> or <code>auth.protect()</code> predicate incorrectly returns <code>true</code>.</li>
<li>The application grants the attacker access to the protected resource or functionality.</li>
<li>In the case of the <code>@clerk/nextjs</code> bypass, the attacker might exploit the silent discarding of authorization parameters when <code>unauthenticatedUrl</code>, <code>unauthorizedUrl</code>, or <code>token</code> are also present in the <code>auth.protect()</code> call, effectively bypassing authorization.</li>
<li>The attacker performs unauthorized actions, such as modifying data or accessing restricted areas of the application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could lead to unauthorized access to sensitive resources and functionalities within applications using Clerk for authentication and authorization. This could result in data breaches, privilege escalation, and other security incidents. The vulnerability affects a wide range of Clerk packages, potentially impacting a significant number of applications relying on Clerk for access control. Immediate patching is crucial to mitigate the risk of exploitation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to the latest patch release of the consuming app&rsquo;s framework package as specified in the advisory to remediate CVE-2026-42349.</li>
<li>If immediate upgrade is not feasible, implement the suggested workaround of splitting combined <code>has()</code> or <code>auth.protect()</code> calls into sequential single-condition checks as described in the advisory.</li>
<li>Deploy the Sigma rule <code>ClerkAuthProtectBypass</code> to detect potential exploitation attempts by monitoring for calls to <code>auth.protect</code> that include <code>unauthenticatedUrl</code>, <code>unauthorizedUrl</code>, or <code>token</code> parameters.</li>
<li>Deploy the Sigma rule <code>ClerkCombinedAuthCheckBypass</code> to identify suspicious process creation events that may indicate unauthorized access due to the authorization bypass.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authorization</category><category>bypass</category><category>clerk</category><category>cve-2026-42349</category></item><item><title>Better Auth OAuth Provider Authorization Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-better-auth-oauth-bypass/</link><pubDate>Fri, 17 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-better-auth-oauth-bypass/</guid><description>An authorization bypass vulnerability exists in Better Auth's OAuth provider, allowing low-privilege users to create OAuth clients despite configured clientPrivileges, potentially leading to unauthorized client registration and increased phishing risks.</description><content:encoded><![CDATA[<p>An authorization bypass vulnerability affects the OAuth provider component of Better Auth, specifically versions 1.4.8-beta.7 through 1.6.4 and 1.7.0-beta.0 through 1.7.0-beta.1. This flaw allows any authenticated, low-privilege user to create OAuth clients, bypassing the intended restrictions set by the <code>clientPrivileges</code> configuration. The vulnerability stems from the client creation endpoints (<code>adminCreateOAuthClient</code> and <code>createOAuthClient</code>) not enforcing the <code>clientPrivileges</code> check before creating new OAuth clients. This bypass allows attackers to register OAuth clients with attacker-controlled redirect URIs and metadata, potentially leading to phishing attacks and abuse of trust assumptions in OAuth/OIDC flows. Defenders should implement detections to identify unauthorized OAuth client creation attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the Better Auth application with a low-privilege account.</li>
<li>The attacker crafts a POST request to either <code>/api/auth/oauth2/create-client</code> or a custom endpoint that routes to <code>adminCreateOAuthClient</code>.</li>
<li>The attacker includes parameters for <code>client_name</code>, <code>redirect_uris</code>, and other client metadata within the POST request body.</li>
<li>The <code>createOAuthClientEndpoint</code> function is called without first performing a <code>clientPrivileges</code> authorization check.</li>
<li>A new OAuth client is created and persisted in the system.</li>
<li>The attacker now controls a registered OAuth client with attacker-defined redirect URIs.</li>
<li>The attacker can potentially use this client for phishing attacks or to bypass consent flows if <code>skip_consent</code> is enabled (if <code>adminCreateOAuthClient</code> is exposed).</li>
<li>The attacker exploits the newly created OAuth client to gain unauthorized access to resources or user data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability allows unauthorized users to create OAuth clients, potentially leading to several negative consequences. Attackers can register clients with malicious redirect URIs, which can be used in phishing campaigns to steal user credentials or OAuth tokens. In scenarios where the <code>adminCreateOAuthClient</code> endpoint is exposed, attackers can create clients that bypass user consent, further increasing the risk of successful attacks. The impact is significant because it breaks the intended access control mechanism of the <code>clientPrivileges</code> configuration, affecting applications that rely on it to restrict client registration. Successful exploitation can lead to unauthorized access to user data, compromised accounts, and damaged trust in the application.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for POST requests to the <code>/api/auth/oauth2/create-client</code> endpoint, especially from users who should not have client creation privileges. Implement the &ldquo;Detect Unauthorized OAuth Client Creation Attempt&rdquo; Sigma rule below, using webserver logs (category: &ldquo;webserver&rdquo;, product: &ldquo;linux&rdquo;).</li>
<li>Apply the necessary patches to upgrade <code>@better-auth/oauth-provider</code> to a version that addresses this vulnerability (&gt;= 1.6.5 or &gt;= 1.7.0-beta.2).</li>
<li>Audit your application&rsquo;s OAuth client registration process to ensure that the <code>clientPrivileges</code> check is enforced correctly.</li>
<li>If using <code>adminCreateOAuthClient</code>, ensure it is not exposed to low-privilege authenticated users to prevent the <code>skip_consent</code> bypass.</li>
<li>Deploy the &ldquo;Detect OAuth Client Creation with Skip Consent&rdquo; Sigma rule if your deployment exposes the admin client creation endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>oauth</category><category>authorization</category><category>bypass</category><category>privilege-escalation</category><category>defense-evasion</category></item><item><title>@fastify/middie Middleware Bypass Vulnerability (CVE-2026-33804)</title><link>https://feed.craftedsignal.io/briefs/2026-04-fastify-middie-bypass/</link><pubDate>Thu, 16 Apr 2026 15:17:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-fastify-middie-bypass/</guid><description>A middleware bypass vulnerability (CVE-2026-33804) exists in @fastify/middie versions 9.3.1 and earlier when the deprecated Fastify ignoreDuplicateSlashes option is enabled, potentially allowing unauthorized access.</description><content:encoded><![CDATA[<p>@fastify/middie, a Fastify middleware engine, is vulnerable to a significant security bypass. Specifically, versions 9.3.1 and earlier are susceptible when the deprecated Fastify <code>ignoreDuplicateSlashes</code> option is enabled. This vulnerability, identified as CVE-2026-33804, arises because the middleware&rsquo;s path matching logic fails to account for the duplicate slash normalization performed by Fastify&rsquo;s router. Consequently, crafted HTTP requests containing duplicate slashes can circumvent middleware authentication and authorization checks, potentially granting unauthorized access to protected resources. This vulnerability only affects applications that are actively using the deprecated <code>ignoreDuplicateSlashes</code> option. The recommended remediation is to upgrade to @fastify/middie version 9.3.2, which addresses this issue. Alternatively, disabling the <code>ignoreDuplicateSlashes</code> option can serve as a mitigation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Fastify application using @fastify/middie version 9.3.1 or earlier with the <code>ignoreDuplicateSlashes</code> option enabled.</li>
<li>The attacker crafts a malicious HTTP request targeting a protected resource. The request URI includes duplicate slashes (e.g., <code>/api//resource</code>).</li>
<li>The request is received by the Fastify server.</li>
<li>Fastify&rsquo;s router normalizes the duplicate slashes in the URI before passing it to the middleware.</li>
<li>The middleware&rsquo;s path matching logic fails to correctly handle the normalized URI due to the <code>ignoreDuplicateSlashes</code> setting.</li>
<li>As a result, the request bypasses the intended authentication and/or authorization checks implemented by the middleware.</li>
<li>The request reaches the targeted resource, which is processed by the application.</li>
<li>The attacker gains unauthorized access to the resource, potentially leading to data breaches, privilege escalation, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to bypass authentication and authorization controls, potentially gaining unauthorized access to sensitive data or functionality within the Fastify application. The severity of the impact depends on the nature of the protected resources and the extent of the attacker&rsquo;s access. This could lead to data breaches, privilege escalation, or other malicious activities. The number of potential victims is dependent on the number of applications using the vulnerable version of @fastify/middie with the <code>ignoreDuplicateSlashes</code> option enabled.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade @fastify/middie to version 9.3.2 or later to patch the vulnerability described in CVE-2026-33804.</li>
<li>Disable the <code>ignoreDuplicateSlashes</code> option in Fastify configurations as an alternative mitigation.</li>
<li>Deploy the Sigma rule <code>DetectFastifyMiddieBypassAttempt</code> to identify potential exploitation attempts based on duplicate slashes in the request URI.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>fastify</category><category>middie</category><category>middleware</category><category>bypass</category><category>cve-2026-33804</category><category>defense-evasion</category></item><item><title>Better Auth Two-Factor Authentication Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-better-auth-2fa-bypass/</link><pubDate>Fri, 03 Apr 2026 03:29:59 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-better-auth-2fa-bypass/</guid><description>Better Auth versions prior to 1.4.9 have a critical two-factor authentication bypass vulnerability; when session.cookieCache is enabled, the initial sign-in session may be improperly cached, allowing attackers with valid credentials to bypass 2FA.</description><content:encoded><![CDATA[<p>Better Auth versions prior to 1.4.9 contain a critical vulnerability that can lead to two-factor authentication (2FA) bypass. The vulnerability arises when the <code>session.cookieCache</code> is enabled. In this configuration, the initial session created during the login process can be prematurely cached before the 2FA verification is completed. Consequently, subsequent session lookups might use this cached session, circumventing the necessary 2FA check. This issue allows an attacker who possesses valid primary credentials to gain unauthorized access to protected application routes without completing the mandated second authentication factor. Any application leveraging <code>better-auth</code> with 2FA and session cookie caching enabled is potentially vulnerable.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>User attempts to log in with valid username and password.</li>
<li>The application, running a vulnerable version of <code>better-auth</code> with <code>session.cookieCache</code> enabled, creates a session.</li>
<li>The session is cached due to the <code>session.cookieCache</code> setting, <em>before</em> the 2FA challenge is presented.</li>
<li>The user is prompted for their second factor (e.g., TOTP code).</li>
<li>Instead of providing the 2FA code, the attacker intercepts or reuses the cached session cookie.</li>
<li>The attacker presents the cached session cookie to the application.</li>
<li>The application retrieves the cached session, which it prematurely considers valid.</li>
<li>The attacker gains access to protected resources without completing 2FA.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers with valid usernames and passwords to bypass two-factor authentication, gaining unauthorized access to sensitive application resources. The number of affected applications is unknown, but all applications using <code>better-auth</code> with 2FA and session caching are potentially at risk. A successful attack could lead to data breaches, account takeovers, and other serious security incidents.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to <code>better-auth</code> version 1.4.9 or later to patch the vulnerability.</li>
<li>Disable <code>session.cookieCache</code> when using two-factor authentication as a temporary mitigation.</li>
<li>If disabling <code>session.cookieCache</code> is not feasible, implement server-side checks to ensure 2FA is completed before granting full session validity (requires code modification).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>authentication</category><category>2fa</category><category>bypass</category><category>better-auth</category></item><item><title>Moby Authorization Plugin Bypass via Oversized Request Bodies</title><link>https://feed.craftedsignal.io/briefs/2026-04-moby-authz-bypass/</link><pubDate>Fri, 27 Mar 2026 17:44:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-moby-authz-bypass/</guid><description>A vulnerability in Moby allows attackers to bypass authorization plugins by crafting API requests with oversized bodies, causing the Docker daemon to forward the request without the body to the plugin, potentially leading to unauthorized actions.</description><content:encoded><![CDATA[<p>A vulnerability exists in Moby (Docker) that can be exploited to bypass authorization plugins (AuthZ) when processing API requests. This vulnerability occurs because the Docker daemon may forward a request to an authorization plugin without the request body if the body is oversized. This incomplete fix for CVE-2024-41110 allows an attacker to craft a specific API request that triggers this behavior. This could lead to an AuthZ plugin making incorrect authorization decisions, potentially allowing unauthorized actions to be performed. This affects deployments that rely on AuthZ plugins that inspect the request body for access control. The vulnerable packages include <code>go/github.com/moby/moby</code> (versions prior to 29.3.1), <code>go/github.com/docker/docker</code> (versions prior to 29.3.1), and <code>go/github.com/moby/moby/v2</code> (versions prior to 2.0.0-beta.8).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Docker environment utilizing an AuthZ plugin that relies on request body inspection for authorization.</li>
<li>Attacker crafts a malicious Docker API request targeting a sensitive resource or action.</li>
<li>The attacker inflates the request body to exceed a size threshold that triggers the bypass behavior.</li>
<li>The Docker daemon receives the oversized API request.</li>
<li>Due to the vulnerability, the Docker daemon forwards the request to the AuthZ plugin without the request body.</li>
<li>The AuthZ plugin, lacking the request body, makes an authorization decision based on incomplete information.</li>
<li>The AuthZ plugin, unable to properly validate the request, grants access to the sensitive resource or action.</li>
<li>The attacker successfully executes the unauthorized action, bypassing the intended security controls.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability primarily impacts Docker environments that utilize authorization plugins and rely on request body inspection for access control decisions. If exploited successfully, an attacker can bypass the intended authorization mechanisms, potentially leading to unauthorized access to sensitive resources, data breaches, or other malicious activities within the containerized environment. The severity is high for affected installations, however, the base likelihood of exploitation is low, and only impacts those using AuthZ plugins.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Moby version 29.3.1 or later to address the vulnerability. This resolves the incomplete fix for CVE-2024-41110 and prevents the AuthZ bypass.</li>
<li>For environments where immediate upgrades are not possible, avoid using AuthZ plugins that rely on request body inspection for security decisions as described in the overview.</li>
<li>Restrict access to the Docker API to trusted parties following the principle of least privilege to reduce the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>docker</category><category>authz</category><category>authorization</category><category>bypass</category><category>cve-2026-34040</category></item><item><title>Claude Code Workspace Trust Dialog Bypass via Settings Loading Order (CVE-2026-33068)</title><link>https://feed.craftedsignal.io/briefs/2026-03-claude-code-bypass/</link><pubDate>Sat, 21 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-claude-code-bypass/</guid><description>A maliciously crafted `.claude/settings.json` file in a Claude Code repository (versions prior to 2.1.53) can bypass the workspace trust confirmation dialog by exploiting a configuration loading order defect, allowing for arbitrary code execution within a supposedly untrusted workspace.</description><content:encoded><![CDATA[<p>CVE-2026-33068 affects Anthropic&rsquo;s Claude Code CLI tool in versions prior to 2.1.53. The vulnerability stems from a configuration loading order defect where repository-level settings, specifically those defined in <code>.claude/settings.json</code>, are resolved before the workspace trust dialog is presented to the user. This allows a malicious repository to include a <code>.claude/settings.json</code> file containing <code>bypassPermissions</code> entries. These permissions are then applied before the user has the opportunity…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>claude-code</category><category>workspace-trust</category><category>cve-2026-33068</category><category>bypass</category></item><item><title>MOTW Bypass via CAB, TAR, and 7-Zip Chaining</title><link>https://feed.craftedsignal.io/briefs/2026-03-motw-bypass/</link><pubDate>Thu, 19 Mar 2026 17:31:15 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-motw-bypass/</guid><description>A newly discovered Mark of the Web (MOTW) bypass technique utilizes a chain of CAB, TAR, and 7-Zip archives to circumvent SmartScreen and execute files without security warnings.</description><content:encoded><![CDATA[<p>A new MOTW bypass technique has emerged that chains a CAB file with two TAR archives nested within a 7-Zip archive. This method effectively strips the Zone.Identifier stream from downloaded files, preventing the display of SmartScreen prompts or security warnings. Many organizations rely on MOTW and SmartScreen as a crucial layer of defense against phishing attacks. This bypass, affecting fully patched environments, allows attackers to execute arbitrary code without the usual security checks, potentially leading to malware infection or data compromise. The technique is not a rehash of older 7-Zip MOTW issues but a novel approach to evade detection based on Zone.Identifier.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious payload.</li>
<li>Attacker packages the payload into a TAR archive.</li>
<li>The TAR archive is nested inside another TAR archive.</li>
<li>The nested TAR archives are then compressed into a 7-Zip archive using 7z.exe.</li>
<li>The 7-Zip archive is packaged into a CAB archive using makecab.exe.</li>
<li>The CAB archive is distributed to the victim, potentially via phishing or drive-by download.</li>
<li>The victim opens the CAB archive, extracting the nested 7-Zip, TAR, and payload.</li>
<li>The payload executes without a Zone.Identifier stream, bypassing MOTW and SmartScreen, potentially leading to malware infection or unauthorized access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to bypass security controls that rely on MOTW and SmartScreen. This can lead to malware infections, data breaches, or other malicious activities. The bypass affects fully patched environments, increasing the scope of potential victims. The absence of security warnings makes it more likely that users will execute the malicious payload, increasing the success rate of attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement detections for unusual process chains involving <code>makecab.exe</code>, <code>7z.exe</code>, and <code>tar.exe</code> as these tools are used in the bypass (see Sigma rule &ldquo;Detect Suspicious Archive Chaining&rdquo;).</li>
<li>Monitor for archive extractions from unusual locations, especially those originating from downloaded CAB files, using file event logging and process monitoring (see Sigma rule &ldquo;Detect Archive Extraction from Downloaded CAB&rdquo;).</li>
<li>Analyze network connections from processes spawned from archive extractions, as they may indicate command and control or data exfiltration.</li>
<li>Block the URL <code>https://youtu.be/pQxiPwGTBL8</code> to prevent users from accessing potentially malicious content related to this bypass.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>motw</category><category>bypass</category><category>phishing</category><category>defense-evasion</category><category>archive</category><category>7-zip</category><category>cab</category><category>tar</category></item><item><title>Credential Guard Bypass and Detection Strategies</title><link>https://feed.craftedsignal.io/briefs/2026-03-credential-guard-bypass/</link><pubDate>Wed, 18 Mar 2026 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-credential-guard-bypass/</guid><description>This brief covers offensive techniques to bypass Credential Guard, a Windows security feature designed to protect credentials, and provides detection strategies for these bypass attempts.</description><content:encoded><![CDATA[<p>Credential Guard is a Windows security feature that uses virtualization-based security (VBS) to isolate and protect sensitive credentials, such as NTLM hashes and Kerberos tickets, preventing their theft by malware running in the standard operating system environment. The linked article from ipurple.team, published on March 17, 2026, discusses offensive techniques used to bypass Credential Guard, potentially allowing attackers to gain access to protected credentials despite the enabled security measures. Understanding these bypass techniques is crucial for defenders to implement appropriate detection and prevention strategies. The scope of the threat involves any Windows environment where Credential Guard is enabled, with attackers seeking to compromise credentials for lateral movement and privilege escalation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>While the specifics of the attack chain depend on the bypass technique detailed in the linked article, a general attack chain for Credential Guard bypass might look like this:</p>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access to the system through methods such as phishing, exploiting a vulnerability, or using stolen credentials.</li>
<li><strong>Privilege Escalation:</strong> The attacker escalates privileges to Administrator or SYSTEM level, often required to perform actions that interact with Credential Guard.</li>
<li><strong>Credential Guard Check:</strong> The attacker probes the system to determine if Credential Guard is enabled and active.</li>
<li><strong>Bypass Technique Execution:</strong> The attacker executes a specific Credential Guard bypass technique, potentially involving kernel-level exploits, direct memory access, or manipulation of VBS.</li>
<li><strong>Credential Theft:</strong> After successfully bypassing Credential Guard, the attacker attempts to access the protected credentials, such as NTLM hashes, Kerberos tickets, or other secrets.</li>
<li><strong>Credential Decryption/Use:</strong> The attacker decrypts or utilizes the stolen credentials to impersonate users, gain access to network resources, or perform other malicious activities.</li>
<li><strong>Lateral Movement:</strong> The attacker uses the compromised credentials to move laterally to other systems within the network.</li>
<li><strong>Objective Completion:</strong> The attacker achieves their final objective, such as data exfiltration, ransomware deployment, or system disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful Credential Guard bypass can lead to widespread compromise within an organization. Attackers can gain access to sensitive data, move laterally across the network, and escalate privileges to domain administrator. Depending on the environment, this could result in significant financial loss, reputational damage, and disruption of business operations. Organizations across various sectors are vulnerable if they rely on Credential Guard as a primary defense against credential theft.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Investigate the linked article (<a href="https://ipurple.team/2026/03/17/credential-guard/">https://ipurple.team/2026/03/17/credential-guard/</a>) to understand the specific bypass techniques and indicators discussed.</li>
<li>Enable and review Windows event logs related to virtualization-based security (VBS) and Credential Guard for anomalies that might indicate bypass attempts.</li>
<li>Deploy the Sigma rules in this brief to your SIEM to detect potential Credential Guard bypass attempts based on suspicious process creation and registry modifications.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-guard</category><category>bypass</category><category>windows</category></item><item><title>Admidio Inverted 2FA Reset Allows Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2024-01-admidio-2fa-bypass/</link><pubDate>Mon, 22 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-admidio-2fa-bypass/</guid><description>A logic error in Admidio's two-factor authentication reset inverts the authorization check, allowing non-admin users to remove other users' TOTP, including administrators, reducing their security to password-only authentication in versions 5.0.8 and earlier.</description><content:encoded><![CDATA[<p>Admidio, a web-based content management system for organizations, contains a critical vulnerability in its two-factor authentication (2FA) reset mechanism. The vulnerability, present in versions 5.0.8 and earlier, stems from an inverted authorization check within the <code>modules/profile/two_factor_authentication.php</code> script. This flaw enables non-administrative users, specifically group leaders with profile edit rights, to disable 2FA for other users, including administrator accounts. The vulnerability was reported on April 29, 2026. By exploiting this flaw, attackers can bypass 2FA, gaining unauthorized access to privileged accounts and potentially compromising the entire Admidio installation. This highlights the importance of rigorous security audits and proper authorization checks in web applications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises or gains access to a non-admin user account within Admidio that possesses <code>hasRightEditProfile()</code> permission over an administrator account.</li>
<li>The attacker crafts a POST request to <code>/adm_program/modules/profile/two_factor_authentication.php</code> with the <code>mode</code> parameter set to <code>reset</code> and the <code>user_uuid</code> parameter set to the UUID of the target administrator account.</li>
<li>The server-side script <code>modules/profile/two_factor_authentication.php</code> executes the flawed authorization check at line 84. Due to the inverted logic (<code>!==</code> instead of <code>===</code>), the check incorrectly grants permission to the non-admin user to reset the administrator&rsquo;s 2FA.</li>
<li>The server removes the TOTP configuration associated with the administrator&rsquo;s account from the database or configuration files.</li>
<li>The attacker can now attempt to log in to the administrator account using only the password, bypassing the 2FA requirement.</li>
<li>If the attacker knows or can guess the administrator&rsquo;s password (via credential stuffing, brute force, or other means), they successfully gain access to the account.</li>
<li>With administrator privileges, the attacker can perform a variety of malicious actions, such as creating new accounts, modifying website content, or accessing sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The vulnerability allows attackers to bypass two-factor authentication on administrator accounts in Admidio installations. This can lead to unauthorized access to sensitive data, modification of website content, and potentially full control over the affected system. While the number of affected installations is unknown, organizations using vulnerable versions of Admidio are at risk. Success of the attack results in complete compromise of the Admidio instance and the data it manages.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the recommended fix by changing <code>!==</code> to <code>===</code> on line 84 of <code>modules/profile/two_factor_authentication.php</code> to correct the authorization logic (see Overview).</li>
<li>Deploy the Sigma rule <code>Detect Admidio 2FA Reset Request</code> to detect attempts to exploit this vulnerability by monitoring HTTP POST requests to the vulnerable endpoint (see Rules).</li>
<li>Upgrade Admidio to a patched version that incorporates the fix for CVE-2026-41660.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>2fa</category><category>bypass</category><category>privilege-escalation</category><category>admidio</category></item></channel></rss>