Vulnerability Note VU#555984
Avigilon Control Center is vulnerable to path traversal
Original Release date: 10 Jun 2015 | Last revised: 10 Jun 2015
The Avigilon Control Center (ACC) is a server software for security and surveillance systems. The ACC Server is vulnerable to a path traversal attack, allowing an attacker to access any file on the server.
CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) – CVE-2015-2860
The /help/ path of a URL to an ACC Server is improperly parsed, allowing an attacker to perform a path traversal to access any file on the underlying system.
An unauthenticated remote attacker may access any file on the underlying system running ACC Server.
Apply an update
Avigilon has released updates addressing this issue in affected products; users are encouraged to update as soon as possible. For ACC Server version 5, please update to 220.127.116.11 or later. For ACC Server version 4, please update to 18.104.22.168 or later.
Vendor Information (Learn More)
VendorStatusDate NotifiedDate UpdatedAvigilonAffected11 May 201510 Jun 2015If you are a vendor and your product is affected, let
CVSS Metrics (Learn More)
Thanks to Jürgen Bilberger for reporting this vulnerability, and to Avigilon for quickly addressing this issue.
This document was written by Garret Wassermann.
08 Jun 2015
Date First Published:
10 Jun 2015
Date Last Updated:
10 Jun 2015
FeedbackIf you have feedback, comments, or additional information about this vulnerability, please send us email.