CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
EPSS
Percentile
79.7%
Web Viewer for Samsung DVR
Link:
<https://www.samsung-security.com/products/video-recording-and-management/dvr.aspx>
Severity level: Medium
Impact: Access to sensitive information
Access Vector: Remote
CVSS v2:
Base Score: 5.0
Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE: CVE-2013-3585
Web Viewer for Samsung DVR allows you to get remote access to security cameras.
The specialists of the Positive Research center have detected “Disclosure of sensitive information” vulnerability associated with Absence of Password Hashing in Web Viewer for Samsung DVR.
Users credentials (logins and passwords) are stored in plaintext at pages, not hashed or encrypted. This Vulnerability allows attackers to get an unauthorized access to view and control the cameras via unsafe web-server configuration. If an attacker sends the packet with specially crafted cookies to server with Web Viewer for Samsung DVR, web-server will provide access to internal pages, including page with users credentials. Local user can get all other users credentials.
No solution is available
Workaround
Restrict access to the Samsung Web Viewer for Samsung DVR interface
Restrict access to the Samsung DVR Web Viewer interface to trusted networks. If there is such a possibility, configure management and transit networks for separate VLANs, or restrict access to the device using IP access lists.
10.04.2013 - Vendor is notified
30.05.2013 - Vulnerability details were sent to CERT
30.08.2013 - Public disclosure
The vulnerability was detected by Andrey Bezborodov, Positive Research Center (Positive Technologies Company)
<http://en.securitylab.ru/lab/PT-2013-61>
<http://www.kb.cert.org/vuls/id/882286>
Reports on the vulnerabilities previously discovered by Positive Research:
<http://ptsecurity.com/research/advisory/>
<http://en.securitylab.ru/lab/>