PT-2013-61: Disclosure of sensitive information in Web Viewer for Samsung DVR
Vulnerable software
Web Viewer for Samsung DVR
Link:
https://www.samsung-security.com/products/video-recording-and-management/dvr.aspx
Severity level
Severity level: Medium
Impact: Access to sensitive information
Access Vector: Remote
CVSS v2:
Base Score: 5.0
Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE: CVE-2013-3585
Software description
Web Viewer for Samsung DVR allows you to get remote access to security cameras.
Vulnerability description
The specialists of the Positive Research center have detected "Disclosure of sensitive information" vulnerability associated with Absence of Password Hashing in Web Viewer for Samsung DVR.
Users credentials (logins and passwords) are stored in plaintext at pages, not hashed or encrypted. This Vulnerability allows attackers to get an unauthorized access to view and control the cameras via unsafe web-server configuration. If an attacker sends the packet with specially crafted cookies to server with Web Viewer for Samsung DVR, web-server will provide access to internal pages, including page with users credentials. Local user can get all other users credentials.
How to fix
No solution is available
Workaround
Restrict access to the Samsung Web Viewer for Samsung DVR interface
Restrict access to the Samsung DVR Web Viewer interface to trusted networks. If there is such a possibility, configure management and transit networks for separate VLANs, or restrict access to the device using IP access lists.
Advisory status
10.04.2013 - Vendor is notified
30.05.2013 - Vulnerability details were sent to CERT
30.08.2013 - Public disclosure
Credits
The vulnerability was detected by Andrey Bezborodov, Positive Research Center (Positive Technologies Company)
References
http://en.securitylab.ru/lab/PT-2013-61
http://www.kb.cert.org/vuls/id/882286
Reports on the vulnerabilities previously discovered by Positive Research:
http://ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/