The vulnerability allowed an authentication bypass for the Control UI when gateway.controlUi.allowInsecureAuth was enabled in an insecure deployment over plaintext HTTP. The root cause of this vulnerability is located in the attachGatewayWsMessageHandler function in src/gateway/server/ws-connection/message-handler.ts. This function is responsible for handling WebSocket connections and their authentication.
The analysis of the patch commit 40a292619e1f2be3a3b1db663d7494c9c2dc0abf shows a critical change in this function. Previously, a boolean variable allowControlUiBypass was set to true if gateway.controlUi.allowInsecureAuth was enabled. This bypass flag effectively disabled security checks that enforce a secure context (like HTTPS) and device pairing for the Control UI. The fix removes the influence of allowInsecureAuth on this bypass logic, thereby hardening the authentication process. Now, the bypass is only triggered by a more explicit and dangerously named flag, dangerouslyDisableDeviceAuth.
During an exploitation attempt, a runtime profiler would capture attachGatewayWsMessageHandler in the execution stack, as this function is the entry point for processing the malicious connection request that exploits the authentication bypass. The end-to-end tests modified in the patch further confirm that this function contains the core vulnerable logic.