CVE-2022-38351: n/a in n/a
A vulnerability in Suprema BioStar (aka Bio Star) 2 v2.8.16 allows attackers to escalate privileges to System Administrator via a crafted PUT request to the update profile page.
AI Analysis
Technical Summary
CVE-2022-38351 is a high-severity vulnerability affecting Suprema BioStar 2 version 2.8.16, a widely used biometric access control and security management platform. The vulnerability allows an attacker with limited privileges (low privilege user) to escalate their privileges to that of a System Administrator by sending a specially crafted HTTP PUT request to the update profile page. This indicates a flaw in the access control or authorization logic of the application, specifically related to handling profile updates. Exploiting this vulnerability does not require user interaction and can be performed remotely over the network, as the attack vector is network-based (AV:N). The vulnerability impacts confidentiality, integrity, and availability (C:H/I:H/A:H) since gaining System Administrator privileges can lead to full control over the system, including access to sensitive biometric data, modification or deletion of security policies, and disruption of security services. The CVSS 3.1 base score is 8.8, reflecting the high risk posed by this vulnerability. Although no known exploits have been reported in the wild yet, the ease of exploitation and the critical nature of the access control bypass make it a significant threat. The underlying weakness corresponds to CWE-269 (Improper Privilege Management), highlighting a failure to enforce proper authorization checks on privileged operations. Suprema BioStar 2 is commonly deployed in enterprise, government, and critical infrastructure environments for physical access control, making this vulnerability particularly concerning for organizations relying on it for security enforcement.
Potential Impact
For European organizations, the impact of this vulnerability can be severe. Organizations using Suprema BioStar 2 for physical access control could face unauthorized access to secure facilities, potentially leading to theft, espionage, or sabotage. The compromise of System Administrator privileges could allow attackers to manipulate access logs, disable alarms, or create backdoors, undermining the integrity of security operations. Sensitive biometric data stored or processed by the system could be exposed, violating privacy regulations such as GDPR, and resulting in legal and reputational damage. Critical infrastructure sectors such as energy, transportation, and government agencies that rely on Suprema BioStar 2 for controlling access to sensitive areas are at heightened risk. The ability to escalate privileges remotely without user interaction increases the likelihood of targeted attacks or automated exploitation attempts. This vulnerability could also facilitate lateral movement within networks, enabling attackers to pivot to other systems once physical access controls are compromised.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately verify if they are running Suprema BioStar 2 version 2.8.16 or earlier versions that might be affected. Since no official patch links are provided, organizations should contact Suprema support or their vendor representatives to obtain security updates or patches addressing CVE-2022-38351. In the interim, organizations should restrict network access to the BioStar 2 management interface to trusted administrative networks only, using network segmentation and firewall rules to limit exposure. Implement strict monitoring and logging of access to the update profile page and related administrative functions to detect suspicious PUT requests or privilege escalation attempts. Employ multi-factor authentication for administrative accounts to reduce the risk of compromised credentials being leveraged. Conduct regular audits of user privileges and remove unnecessary low-privilege accounts that could be exploited. Additionally, consider deploying web application firewalls (WAFs) with custom rules to detect and block anomalous HTTP PUT requests targeting the update profile endpoint. Finally, ensure that incident response plans include procedures for rapid containment and remediation should exploitation be detected.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2022-38351: n/a in n/a
Description
A vulnerability in Suprema BioStar (aka Bio Star) 2 v2.8.16 allows attackers to escalate privileges to System Administrator via a crafted PUT request to the update profile page.
AI-Powered Analysis
Technical Analysis
CVE-2022-38351 is a high-severity vulnerability affecting Suprema BioStar 2 version 2.8.16, a widely used biometric access control and security management platform. The vulnerability allows an attacker with limited privileges (low privilege user) to escalate their privileges to that of a System Administrator by sending a specially crafted HTTP PUT request to the update profile page. This indicates a flaw in the access control or authorization logic of the application, specifically related to handling profile updates. Exploiting this vulnerability does not require user interaction and can be performed remotely over the network, as the attack vector is network-based (AV:N). The vulnerability impacts confidentiality, integrity, and availability (C:H/I:H/A:H) since gaining System Administrator privileges can lead to full control over the system, including access to sensitive biometric data, modification or deletion of security policies, and disruption of security services. The CVSS 3.1 base score is 8.8, reflecting the high risk posed by this vulnerability. Although no known exploits have been reported in the wild yet, the ease of exploitation and the critical nature of the access control bypass make it a significant threat. The underlying weakness corresponds to CWE-269 (Improper Privilege Management), highlighting a failure to enforce proper authorization checks on privileged operations. Suprema BioStar 2 is commonly deployed in enterprise, government, and critical infrastructure environments for physical access control, making this vulnerability particularly concerning for organizations relying on it for security enforcement.
Potential Impact
For European organizations, the impact of this vulnerability can be severe. Organizations using Suprema BioStar 2 for physical access control could face unauthorized access to secure facilities, potentially leading to theft, espionage, or sabotage. The compromise of System Administrator privileges could allow attackers to manipulate access logs, disable alarms, or create backdoors, undermining the integrity of security operations. Sensitive biometric data stored or processed by the system could be exposed, violating privacy regulations such as GDPR, and resulting in legal and reputational damage. Critical infrastructure sectors such as energy, transportation, and government agencies that rely on Suprema BioStar 2 for controlling access to sensitive areas are at heightened risk. The ability to escalate privileges remotely without user interaction increases the likelihood of targeted attacks or automated exploitation attempts. This vulnerability could also facilitate lateral movement within networks, enabling attackers to pivot to other systems once physical access controls are compromised.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately verify if they are running Suprema BioStar 2 version 2.8.16 or earlier versions that might be affected. Since no official patch links are provided, organizations should contact Suprema support or their vendor representatives to obtain security updates or patches addressing CVE-2022-38351. In the interim, organizations should restrict network access to the BioStar 2 management interface to trusted administrative networks only, using network segmentation and firewall rules to limit exposure. Implement strict monitoring and logging of access to the update profile page and related administrative functions to detect suspicious PUT requests or privilege escalation attempts. Employ multi-factor authentication for administrative accounts to reduce the risk of compromised credentials being leveraged. Conduct regular audits of user privileges and remove unnecessary low-privilege accounts that could be exploited. Additionally, consider deploying web application firewalls (WAFs) with custom rules to detect and block anomalous HTTP PUT requests targeting the update profile endpoint. Finally, ensure that incident response plans include procedures for rapid containment and remediation should exploitation be detected.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-08-15T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68388485182aa0cae2841531
Added to database: 5/29/2025, 4:00:05 PM
Last enriched: 7/7/2025, 11:11:57 PM
Last updated: 2/7/2026, 6:22:15 AM
Views: 40
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
UnknownCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumCVE-2025-12159: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.