SerVision HVG Video Gateway web interface contains multiple vulnerabilities affecting multiple firmware versions.
By visiting time.htm, a user is issued a cookie that grants administrative privileges in the Servision HVG web interface. There are two distinct impacts of this vulnerability:
CWE-259: Use of Hard-Coded Password - CVE-2015-0930
A remote, unauthenticated user may be able to gain administrative privileges on the device.
Apply an upgrade
Users are encouraged to update their firmware to version 2.2.26a100.
Those unable to update should consider the following workaround.
As a general good security practice, only allow connections from trusted hosts and networks. Appropriate firewall rules which block incoming connections from untrusted networks would likely prevent an external attacker from accessing the device. Note that this does not address the issue of trusted, authenticated users accessing time.htm and gaining elevated privileges.
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Notified: December 09, 2014 Updated: January 29, 2015
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Group | Score | Vector
Base | 10 | AV:N/AC:L/Au:N/C:C/I:C/A:C
Temporal | 7.9 | E:F/RL:OF/RC:UR
Environmental | 5.9 | CDP:ND/TD:M/CR:ND/IR:ND/AR:ND
Thanks to Richard Tafoya for reporting this vulnerability.
This document was written by Joel Land.