Vulnerability Note VU#555984
Avigilon Control Center is vulnerable to path traversal
Original Release date: 10 Jun 2015 | Last revised: 10 Jun 2015

Overview
The Avigilon Control Center (ACC) is a server software for security and surveillance systems. The ACC Server is vulnerable to a path traversal attack, allowing an attacker to access any file on the server.

Description
CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) – CVE-2015-2860
The /help/ path of a URL to an ACC Server is improperly parsed, allowing an attacker to perform a path traversal to access any file on the underlying system.

Impact
An unauthenticated remote attacker may access any file on the underlying system running ACC Server.

Solution
Apply an update

Avigilon has released updates addressing this issue in affected products; users are encouraged to update as soon as possible. For ACC Server version 5, please update to 5.4.2.22 or later. For ACC Server version 4, please update to 4.12.0.54 or later.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate UpdatedAvigilonAffected11 May 201510 Jun 2015If you are a vendor and your product is affected, let
us know.

CVSS Metrics (Learn More)

Group
Score
Vector

Base
7.8
AV:N/AC:L/Au:N/C:C/I:N/A:N

Temporal
6.1
E:POC/RL:OF/RC:C

Environmental
4.6
CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

http://avigilon.com/support-and-downloads/for-software/software-updates-and-downloads/

Credit

Thanks to Jürgen Bilberger for reporting this vulnerability, and to Avigilon for quickly addressing this issue.
This document was written by Garret Wassermann.

Other Information

CVE IDs:
CVE-2015-2860

Date Public:
08 Jun 2015

Date First Published:
10 Jun 2015

Date Last Updated:
10 Jun 2015

Document Revision:
29

FeedbackIf you have feedback, comments, or additional information about this vulnerability, please send us email.

Leave a Reply