5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.01 Low
EPSS
Percentile
83.7%
The PolyVision RoomWizard web based scheduling system with touch screen display contains two vulnerabilities that allow an unauthorized user to access the device console and Sync Connector Active Directory credentials.
The PolyVision RoomWizard is a touch screen scheduling device with a web-based administrative interface. The Sync Connector feature allows the RoomWizard to communicate with Microsoft Exchange in an Microsoft Windows Actitve Directory (AD) environment. The Sync Connector AD credentials are disclosed in the content of a web page on the administrative interface. This vulnerability has been reported to be affected in RoomWizard firmware version 3.2.3.
An additional issue exists in that the RoomWizard ships with a default password on the administrator account permitting console access via HTTP.
An attacker with HTTP access to a RoomWizard device and knowledge of the administrative password could obtain the AD credentials. The attacker could also modify settings, including network configuration, which could prevent legitimate users from accessing the RoomWizard device.
Change default passwords
Change the default administrative password before deploying RoomWizard devices in an production environment.
Upgrade
It has been reported to us that RoomWizard firmware version 3.2.3 is affected by this vulnerability. PolyVision was unable to reproduce the Sync Connector AD credentials vulnerability utilizing the latest revisions of the Room Wizard firmware, version 3.5. PolyVision recommends all RoomWizard devices be upgraded to the latest version of firmware.
Restrict access
Restrict network access to the RoomWizard and other devices using open protocols like HTTP.
PolyVision also recommends requiring the use of SSL on the RoomWizard device if possible.
870601
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: October 18, 2010 Updated: December 08, 2010
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
<http://steelcase.polyvision.com/support/downloads-roomwiz.asp>
Thanks to Sean Lam for reporting this vulnerability.
This document was written by Michael Orlando.
CVE IDs: | CVE-2010-0214 |
---|---|
Severity Metric: | 1.26 Date Public: |