logo
DATABASE RESOURCES PRICING ABOUT US

Geutebrück G-Cam E2 and G-Code

Description

## 1\. EXECUTIVE SUMMARY * **CVSS v3 9.8** * **ATTENTION: **Exploitable remotely/low attack complexity/public exploits are available * **Vendor:** Geutebrück * **Equipment: **G-Cam E2 and G-Code * **Vulnerabilities:** Missing Authentication for Critical Function, Command Injection, Stack-based Buffer Overflow ## 2\. RISK EVALUATION UDP Technology supplies multiple OEMs such as Geutebrück with firmware for IP cameras. Successful exploitation of these vulnerabilities could allow unauthenticated access to sensitive information; buffer overflow and command injection conditions may allow remote code execution. ## 3\. TECHNICAL DETAILS ### 3.1 AFFECTED PRODUCTS The following Geutebrück devices contain the affected third-party firmware provided by UDP Technology: * E2 Series cameras – G-CAM; Versions 1.12.0.27 and prior, Versions 1.12.13.2 and 1.12.14.5 * EBC-21xx * EFD-22xx * ETHC-22xx * EWPC-22xx * Encoder G-Code; Versions 1.12.0.27 and prior, Versions 1.12.13.2 and 1.12.14.5 * EEC-2xx * EEN-20xx ### 3.2 VULNERABILITY OVERVIEW #### 3.2.1 [MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306](<https://cwe.mitre.org/data/definitions/306.html>) The affected product allows unauthenticated remote access to sensitive files due to default user authentication settings. [CVE-2021-33543](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33543>) has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H>)). #### 3.2.2 [IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN A COMMAND ('COMMAND INJECTION') CWE-77](<https://cwe.mitre.org/data/definitions/77.html>) The affected product is vulnerable to command injection, which may allow an attacker to remotely execute arbitrary code. [CVE-2021-33544](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33544>) has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H>)). #### 3.2.3 [STACK-BASED BUFFER OVERFLOW CWE-121](<https://cwe.mitre.org/data/definitions/121.html>) The affected product is vulnerable to a stack-based buffer overflow condition in the counter parameter which may allow an attacker to remotely execute arbitrary code. [CVE-2021-33545](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33545>) has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H>)). #### 3.2.4 [STACK-BASED BUFFER OVERFLOW CWE-121](<https://cwe.mitre.org/data/definitions/121.html>) The affected product is vulnerable to a stack-based buffer overflow condition in the name parameter, which may allow an attacker to remotely execute arbitrary code. [CVE-2021-33546](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33546>) has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H>)). #### 3.2.5 [STACK-BASED BUFFER OVERFLOW CWE-121](<https://cwe.mitre.org/data/definitions/121.html>) The affected product is vulnerable to a stack-based buffer overflow condition in the profile parameter which may allow an attacker to remotely execute arbitrary code. [CVE-2021-33547](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33547>) has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H>)). #### 3.2.6 [IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN A COMMAND ('COMMAND INJECTION') CWE-77](<https://cwe.mitre.org/data/definitions/77.html>) The affected product is vulnerable to command injection, which may allow an attacker to remotely execute arbitrary code. [CVE-2021-33548](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33548>) has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H>)). #### 3.2.7 [STACK-BASED BUFFER OVERFLOW CWE-121](<https://cwe.mitre.org/data/definitions/121.html>) The affected product is vulnerable to a stack-based buffer overflow condition in the action parameter, which may allow an attacker to remotely execute arbitrary code. [CVE-2021-33549](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33549>) has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H>)). #### 3.2.8 [IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN A COMMAND ('COMMAND INJECTION') CWE-77](<https://cwe.mitre.org/data/definitions/77.html>) The affected product is vulnerable to command injection, which may allow an attacker to remotely execute arbitrary code. [CVE-2021-33550](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33550>) has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H>)). #### 3.2.9 [IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN A COMMAND ('COMMAND INJECTION') CWE-77](<https://cwe.mitre.org/data/definitions/77.html>) The affected product is vulnerable to command injection, which may allow an attacker to remotely execute arbitrary code. [CVE-2021-33551](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33551>) has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H>)). #### 3.2.10 [IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN A COMMAND ('COMMAND INJECTION') CWE-77](<https://cwe.mitre.org/data/definitions/77.html>) The affected product is vulnerable to command injection, which may allow an attacker to remotely execute arbitrary code. [CVE-2021-33552](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33552>) has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H>)). #### 3.2.11 [IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN A COMMAND ('COMMAND INJECTION') CWE-77](<https://cwe.mitre.org/data/definitions/77.html>) The affected product is vulnerable to command injection, which may allow an attacker to remotely execute arbitrary code. [CVE-2021-33553](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33553>) has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H>)). #### 3.2.12 [IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN A COMMAND ('COMMAND INJECTION') CWE-77](<https://cwe.mitre.org/data/definitions/77.html>) The affected product is vulnerable to command injection, which may allow an attacker to remotely execute arbitrary code. [CVE-2021-33554](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33554>) has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H>)). ### 3.3 BACKGROUND * **CRITICAL INFRASTRUCTURE SECTORS:** Commercial Facilities, Energy, Financial Services, Government Facilities, Healthcare and Public Health, Transportation Systems * **COUNTRIES/AREAS DEPLOYED: **Worldwide * **COMPANY HEADQUARTERS LOCATION: **Germany ### 3.4 RESEARCHER Titouan Lazard and Ibrahim Ayadhi from RandoriSec reported these vulnerabilities to CISA. ## 4\. MITIGATIONS Geutebrück strongly recommends updating all affected cameras and encoders listed above to firmware Version 1.12.14.7 or later. The security advisory and the latest firmware can both be acquired on [Geutebrück’s web portal](<https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fportal.geutebrueck.com%2F&data=04%7C01%7Cpaul.lambert%40inl.gov%7Cf980cf8ed61e45ce028808d9505ef3d2%7C4cf464b7869a42368da2a98566485554%7C0%7C0%7C637629191029853114%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=8UP9NuwqOke19wr7iDG2ZjnJt33fyYNXLb3FeAZCPJ0%3D&reserved=0>) (Login required). If updates cannot be deployed, Geutebrück recommends taking the following defensive measures to minimize the risk of exploitation of these vulnerabilities: * Change the default passwords of the cameras. * Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the Internet. * Locate control system networks and remote devices behind firewalls and isolate them from the business network. * When remote access is required, use secure methods, such as virtual private networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices. * Ultimately shut down or disconnect the cameras from the network. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. CISA also provides a section for [control systems security recommended practices](<https://us-cert.cisa.gov/ics/recommended-practices>) on the ICS webpage on [us-cert.cisa.gov](<https://us-cert.cisa.gov/ics>). Several recommended practices are available for reading and download, including [Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies](<https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf>). Additional mitigation guidance and recommended practices are publicly available on the [ICS webpage on us-cert.cisa.gov](<https://us-cert.cisa.gov/ics>) in the Technical Information Paper, [ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies](<https://us-cert.cisa.gov/ics/tips/ICS-TIP-12-146-01B>). Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents. ## Contact Information For any questions related to this report, please contact the CISA at: Email: [CISAservicedesk@cisa.dhs.gov](<mailto:cisaservicedesk@cisa.dhs.gov>) Toll Free: 1-888-282-0870 For industrial control systems cybersecurity information: https://us-cert.cisa.gov/ics or incident reporting: https://us-cert.cisa.gov/report CISA continuously strives to improve its products and services. You can help by choosing one of the links below to provide feedback about this product. This product is provided subject to this Notification and this [Privacy & Use](<https://www.dhs.gov/privacy-policy>) policy. **Please share your thoughts.** We recently updated our anonymous [product survey](<https://www.surveymonkey.com/r/CISA-cyber-survey?product=https://us-cert.cisa.gov/ics/advisories/icsa-21-208-03>); we'd welcome your feedback.


Related