Cythera Cyber Security

Passwordstate - Authentication Bypass Vulnerability

A critical authentication bypass vulnerability in Passwordstate enables an attacker to take over any user account by simply knowing the target's username.
Talk to an expert

Introduction

During an engagement, Cythera identified a high-severity authentication bypass vulnerability in Passwordstate, which allowed full account takeover using only the victim’s username. The issue was assigned CVE-2024-39337 and promptly addressed by Click Studios following responsible disclosure.

The Vulnerability

Passwordstate is an on-premise web-based solution designed for enterprise password management. Commonly adopted by organisations to centrally store and share credentials, the platform supports integration with local Active Directory environments and offers Multi-Factor Authentication (MFA) for added security.- Passwordstate supports two main authentication mechanisms:- Active Directory-integrated login- Local account loginA security flaw was identified that allows authentication bypass across both login methods, posing a significant risk to credential integrity.

Active Directory Integrated Login Vulnerability

A critical flaw was discovered in Passwordstate where an attacker, using only a victim’s Active Directory username, could bypass authentication and gain full access to the victim's account. This includes all credentials the victim can access and any administrative privileges.

Conditions for the attack to succeed:

  • The victim’s account must exist in the Passwordstate system.
  • Active Directory integrated login must be enabled.
  • The attacker must know the victim’s AD username.

The login pages at either /logins/loginadan.aspx or /logins/loginad.aspx must be accessible.

Attack flow:

  • The attacker visits the login page and submits the victim’s AD username with an incorrect password.
  • Despite the failed login, the attacker can directly navigate to the multi-factor authentication (MFA) setup page (e.g., /logins/creategoogletfsecretkey.aspx) and configure MFA.

This setup initiates a partial session, which is mistakenly treated as valid.

As a result, the attacker is granted access to the victim’s account without needing the correct password.

This vulnerability also applies to alternative MFA setup endpoints such as one-time password and ScramblePad authentication, and can act as a method of MFA bypass when using stolen credentials.

Proof of concept

A proof-of-concept video titled "Passwordstate account takeover vulnerability PoC (CVE-2024-39337)" is available on YouTube. For more information, see the vendor’s advisory page.

SAML Authentication Bypass

In environments where Active Directory login uses SAML authentication, the exploit is typically blocked due to redirection to an SSO login page. However, by first visiting the /emergency/ page, the attacker can bypass this restriction and return to the AD login page to execute the attack.

Local Account Login Vulnerability

A similar attack was also found to affect local account logins. If the attacker has the victim’s local login username and access to one of the login pages, they can:

Attempt to log in with an arbitrary password (which fails).

Visit the password reset page (/logins/resetpassword.aspx) where the victim's reset form appears.

Complete the reset and log in using the new password, gaining full access to the account.

Another proof-of-concept video titled "Passwordstate account password reset PoC (CVE-2024-39337)" demonstrates this vulnerability on YouTube.

Remediation

The vulnerability is resolved in Build 9858 of Passwordstate. Users are strongly advised to upgrade to this version as soon as possible.

Disclosure Timeline

  • 04/03/2024 – Vulnerability reported to Click Studios.
  • 07/03/2024 – Patch released in Build 9858.
  • 24/06/2024 – CVE-2024-39337 assigned.
  • 25/06/2024 – Blog published.


CIO
Government Agency
Cythera operates as an extension of our team. When we call there is an immediate response and the person that answers our call is the person that resolves our issue. Cythera understands our network, and more importantly, has taken the time to understand our business. We find it easy to work with Cythera. They are approachable, flexible and have taken the time to build deep relationships with our team. It is a partnership and friendship. Cythera’s personalised, highly specialised services makes all the difference. We would recommend Cythera to anyone in the industry looking for a managed services partner.
Expert methods

We have the tools to pinpoint risks

Whether it’s hidden vulnerabilities or patterns you might miss, we help you stay one step ahead and make confident, informed decisions. Understand how our services can help your business uncover critical risks

Talk to an expert
Employee Cyber Training & Awareness
Your people are your first line of defence. Our cyber training builds awareness sharpens instincts and turns everyday staff into assets.
Advisory
When clarity is critical and stakes are high, our advisory services deliver strategic, executive-level security expertise that empowers decision-making and resilient operations.