PT-2013-61: Disclosure of sensitive information in Web Viewer for Samsung DVR

Vulnerable software

Web Viewer for Samsung DVR

Link:
https://www.samsung-security.com/products/video-recording-and-management/dvr.aspx

Severity level

Severity level: Medium
Impact: Access to sensitive information
Access Vector: Remote

CVSS v2:
Base Score: 5.0
Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVE: CVE-2013-3585

Software description

Web Viewer for Samsung DVR allows you to get remote access to security cameras.

Vulnerability description

The specialists of the Positive Research center have detected "Disclosure of sensitive information" vulnerability associated with Absence of Password Hashing in Web Viewer for Samsung DVR.

Users credentials (logins and passwords) are stored in plaintext at pages, not hashed or encrypted. This Vulnerability allows attackers to get an unauthorized access to view and control the cameras via unsafe web-server configuration. If an attacker sends the packet with specially crafted cookies to server with Web Viewer for Samsung DVR, web-server will provide access to internal pages, including page with users credentials. Local user can get all other users credentials.

How to fix

No solution is available

Workaround

Restrict access to the Samsung Web Viewer for Samsung DVR interface
Restrict access to the Samsung DVR Web Viewer interface to trusted networks. If there is such a possibility, configure management and transit networks for separate VLANs,  or restrict access to the device using IP access lists.

Advisory status

10.04.2013 - Vendor is notified
30.05.2013 - Vulnerability details were sent to CERT
30.08.2013 - Public disclosure

Credits

The vulnerability was detected by Andrey Bezborodov, Positive Research Center (Positive Technologies Company)

References

http://en.securitylab.ru/lab/PT-2013-61
http://www.kb.cert.org/vuls/id/882286

Reports on the vulnerabilities previously discovered by Positive Research:

http://ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/