Lucene search

K
certCERTVU:870601
HistoryJan 07, 2011 - 12:00 a.m.

PolyVision RoomWizard insecurely stores Sync Connector Active Directory credentials and uses default administrative password

2011-01-0700:00:00
www.kb.cert.org
73

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.01 Low

EPSS

Percentile

83.7%

Overview

The PolyVision RoomWizard web based scheduling system with touch screen display contains two vulnerabilities that allow an unauthorized user to access the device console and Sync Connector Active Directory credentials.

Description

The PolyVision RoomWizard is a touch screen scheduling device with a web-based administrative interface. The Sync Connector feature allows the RoomWizard to communicate with Microsoft Exchange in an Microsoft Windows Actitve Directory (AD) environment. The Sync Connector AD credentials are disclosed in the content of a web page on the administrative interface. This vulnerability has been reported to be affected in RoomWizard firmware version 3.2.3.

An additional issue exists in that the RoomWizard ships with a default password on the administrator account permitting console access via HTTP.


Impact

An attacker with HTTP access to a RoomWizard device and knowledge of the administrative password could obtain the AD credentials. The attacker could also modify settings, including network configuration, which could prevent legitimate users from accessing the RoomWizard device.


Solution

Change default passwords

Change the default administrative password before deploying RoomWizard devices in an production environment.

Upgrade

It has been reported to us that RoomWizard firmware version 3.2.3 is affected by this vulnerability. PolyVision was unable to reproduce the Sync Connector AD credentials vulnerability utilizing the latest revisions of the Room Wizard firmware, version 3.5. PolyVision recommends all RoomWizard devices be upgraded to the latest version of firmware.


Restrict access

Restrict network access to the RoomWizard and other devices using open protocols like HTTP.
PolyVision also recommends requiring the use of SSL on the RoomWizard device if possible.


Vendor Information

870601

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

PolyVision Affected

Notified: October 18, 2010 Updated: December 08, 2010

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

<http://steelcase.polyvision.com/support/downloads-roomwiz.asp&gt;

Acknowledgements

Thanks to Sean Lam for reporting this vulnerability.

This document was written by Michael Orlando.

Other Information

CVE IDs: CVE-2010-0214
Severity Metric: 1.26 Date Public:

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.01 Low

EPSS

Percentile

83.7%