Executive Summary

Title Samsung Web Viewer for Samsung DVR allows authentication bypass and password disclosure
Name VU#882286 First vendor Publication 2013-08-21
Vendor VU-CERT Last vendor Modification 2013-08-21
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:H/Au:N/C:C/I:C/A:C)
Cvss Base Score 7.6 Attack Range Network
Cvss Impact Score 10 Attack Complexity High
Cvss Expoit Score 4.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


Vulnerability Note VU#882286

Samsung Web Viewer for Samsung DVR allows authentication bypass and password disclosure

Original Release date: 21 Aug 2013 | Last revised: 21 Aug 2013


Samsung Web Viewer for Samsung DVR contains multiple vulnerabilities including: Cleartext Storage in a File or on Disk (CWE-313) and Authentication Bypass by Assumed-Immutable Data (CWE-302).


CWE-313: Cleartext Storage in a File or on Disk - CVE-2013-3585

Web Viewer for Samsung DVR stores user credentials in plaintext allowing an attacker to parse saved credentials on the user setup webpage.

CWE-302: Authentication Bypass by Assumed-Immutable Data - CVE-2013-3586
Web Viewer for Samsung DVR contains a vulnerability in its cookie-handling procedure that accepts any input as a valid session id if placed after SessionID=. This allows an attacker to send a specially crafted cookie containing an malicious SessionID to the web server which bypasses authentication and can provide access to internal pages, including camera controls and account settings.

For example:
headers = { "Cookie": "=", "Accept": "text/plain"}

The CVSS score below reflects the authentication bypass attack.


A remote unauthenticated attacker may be able to retrieve the device's administrator password, allowing them to directly access the device's configuration web page or system password configuration files.


We are currently unaware of a practical solution to this problem. Please consider the following workaround.

Restrict access to the Samsung Web Viewer for Samsung DVR interface

Restrict access to the Samsung DVR Web Viewer interface to trusted networks. If possible, configure management and transit networks for separate VLANs, or restrict access to the device using IP access lists.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
SamsungAffected05 Jun 201319 Jul 2013
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)



  • https://www.samsung-security.com/products/video-recording-and-management/dvr.aspx
  • http://cwe.mitre.org/data/definitions/313.html
  • http://cwe.mitre.org/data/definitions/302.html


Thanks to Andrey Bezborodov for reporting this vulnerability.

This document was written by Adam Rauf.

Other Information

  • CVE IDs:CVE-2013-3585CVE-2013-3586
  • Date Public:21 Aug 2013
  • Date First Published:21 Aug 2013
  • Date Last Updated:21 Aug 2013
  • Document Revision:26


If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/882286

CWE : Common Weakness Enumeration

% Id Name
50 % CWE-287 Improper Authentication
50 % CWE-255 Credentials Management

CPE : Common Platform Enumeration

Application 1
Hardware 1

Snort® IPS/IDS

Date Description
2017-08-15 possible Samsung DVR authentication bypass attempt
RuleID : 43576 - Revision : 2 - Type : INDICATOR-COMPROMISE

Alert History

If you want to see full details history, please login or register.
Date Informations
2013-08-29 13:27:22
  • Multiple Updates
2013-08-22 00:18:20
  • First insertion