Vulnerability Note VU#522460
SerVision HVG Video Gateway web interface contains multiple vulnerabilities
Original Release date: 02 Feb 2015 | Last revised: 02 Feb 2015

Overview
SerVision HVG Video Gateway web interface contains multiple vulnerabilities affecting multiple firmware versions.

Description
CWE-288: Authentication Bypass Using an Alternate Path or Channel, and CWE-284: Improper Access Control – CVE-2015-0929
By visiting time.htm, a user is issued a cookie that grants administrative privileges in the Servision HVG web interface. There are two distinct impacts of this vulnerability:

An unauthenticated user is able to bypass authentication. This is addressed in firmware version 2.2.26a78 and later.
An authenticated user is able to elevate privileges. This is reportedly not addressed as of the current release, version 2.2.26a100.

CWE-259: Use of Hard-Coded Password – CVE-2015-0930

SerVision HVG contains a hardcoded password that enables a user to log into the web interface with administrative rights. This is addressed in firmware version 2.2.26a100.

Impact
A remote, unauthenticated user may be able to gain administrative privileges on the device.

Solution
Apply an upgrade

Users are encouraged to update their firmware to version 2.2.26a100.

Those unable to update should consider the following workaround.
Restrict access

As a general good security practice, only allow connections from trusted hosts and networks. Appropriate firewall rules which block incoming connections from untrusted networks would likely prevent an external attacker from accessing the device. Note that this does not address the issue of trusted, authenticated users accessing time.htm and gaining elevated privileges.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate UpdatedSerVisionAffected09 Dec 201429 Jan 2015If you are a vendor and your product is affected, let
us know.

CVSS Metrics (Learn More)

Group
Score
Vector

Base
10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal
7.9
E:F/RL:OF/RC:UR

Environmental
5.9
CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

http://cwe.mitre.org/data/definitions/288.html
http://cwe.mitre.org/data/definitions/284.html
http://cwe.mitre.org/data/definitions/259.html

Downloads

Credit

Thanks to Richard Tafoya for reporting this vulnerability.
This document was written by Joel Land.

Other Information

CVE IDs:
CVE-2015-0929
CVE-2015-0930

Date Public:
02 Feb 2015

Date First Published:
02 Feb 2015

Date Last Updated:
02 Feb 2015

Document Revision:
22

FeedbackIf you have feedback, comments, or additional information about this vulnerability, please send us email.

Leave a Reply