Executive Summary

Summary
Title SerVision HVG Video Gateway web interface contains multiple vulnerabilities
Informations
Name VU#522460 First vendor Publication 2015-02-02
Vendor VU-CERT Last vendor Modification 2015-02-02
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#522460

SerVision HVG Video Gateway web interface contains multiple vulnerabilities

Original Release date: 02 Feb 2015 | Last revised: 02 Feb 2015

Overview

SerVision HVG Video Gateway web interface contains multiple vulnerabilities affecting multiple firmware versions.

Description

CWE-288: Authentication Bypass Using an Alternate Path or Channel, and CWE-284: Improper Access Control - CVE-2015-0929

By visiting time.htm, a user is issued a cookie that grants administrative privileges in the Servision HVG web interface. There are two distinct impacts of this vulnerability:

  1. An unauthenticated user is able to bypass authentication. This is addressed in firmware version 2.2.26a78 and later.
  2. An authenticated user is able to elevate privileges. This is reportedly not addressed as of the current release, version 2.2.26a100.

CWE-259: Use of Hard-Coded Password - CVE-2015-0930

SerVision HVG contains a hardcoded password that enables a user to log into the web interface with administrative rights. This is addressed in firmware version 2.2.26a100.

Impact

A remote, unauthenticated user may be able to gain administrative privileges on the device.

Solution

Apply an upgrade

Users are encouraged to update their firmware to version 2.2.26a100.

Those unable to update should consider the following workaround.

Restrict access

As a general good security practice, only allow connections from trusted hosts and networks. Appropriate firewall rules which block incoming connections from untrusted networks would likely prevent an external attacker from accessing the device. Note that this does not address the issue of trusted, authenticated users accessing time.htm and gaining elevated privileges.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
SerVisionAffected09 Dec 201429 Jan 2015
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base10.0AV:N/AC:L/Au:N/C:C/I:C/A:C
Temporal7.9E:F/RL:OF/RC:UR
Environmental5.9CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

  • http://cwe.mitre.org/data/definitions/288.html
  • http://cwe.mitre.org/data/definitions/284.html
  • http://cwe.mitre.org/data/definitions/259.html
  • http://www.servision.net/downloads/

Credit

Thanks to Richard Tafoya for reporting this vulnerability.

This document was written by Joel Land.

Other Information

  • CVE IDs:CVE-2015-0929CVE-2015-0930
  • Date Public:02 Feb 2015
  • Date First Published:02 Feb 2015
  • Date Last Updated:02 Feb 2015
  • Document Revision:22

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/522460

CWE : Common Weakness Enumeration

% Id Name
33 % CWE-284 Access Control (Authorization) Issues
33 % CWE-264 Permissions, Privileges, and Access Controls
33 % CWE-255 Credentials Management

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 2

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2015-02-04 21:26:50
  • Multiple Updates
2015-02-04 05:25:48
  • Multiple Updates
2015-02-02 21:24:36
  • First insertion