Lucene search

K
nessusThis script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.TENABLE_OT_DAHUASECURITY_CVE-2017-3223.NASL
HistoryJul 29, 2024 - 12:00 a.m.

Dahua Security Cameras Stack-based Buffer Overflow (CVE-2017-3223)

2024-07-2900:00:00
This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
12
dahua
ip camera
firmware
buffer overflow
vulnerability
sonia
web interface
remote code execution
unauthenticated attacker
tenable.ot

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8.2

Confidence

Low

Dahua IP camera products using firmware versions prior to V2.400.0000.14.R.20170713 include a version of the Sonia web interface that may be vulnerable to a stack buffer overflow. Dahua IP camera products include an application known as Sonia (/usr/bin/sonia) that provides the web interface and other services for controlling the IP camera remotely. Versions of Sonia included in firmware versions prior to DH_IPC-Consumer-Zi-Themis_Eng_P_V2.408.0000.11.R.20170621 do not validate input data length for the ‘password’ field of the web interface. A remote, unauthenticated attacker may submit a crafted POST request to the IP camera’s Sonia web interface that may lead to out-of-bounds memory operations and loss of availability or remote code execution. The issue was originally identified by the researcher in firmware version DH_IPC- HX1X2X-Themis_EngSpnFrn_N_V2.400.0000.30.R.20160803.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(502326);
  script_version("1.2");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/07/30");

  script_cve_id("CVE-2017-3223");

  script_name(english:"Dahua Security Cameras Stack-based Buffer Overflow (CVE-2017-3223)");

  script_set_attribute(attribute:"synopsis", value:
"The remote OT asset is affected by a vulnerability.");
  script_set_attribute(attribute:"description", value:
"Dahua IP camera products using firmware versions prior to
V2.400.0000.14.R.20170713 include a version of the Sonia web interface
that may be vulnerable to a stack buffer overflow. Dahua IP camera
products include an application known as Sonia (/usr/bin/sonia) that
provides the web interface and other services for controlling the IP
camera remotely. Versions of Sonia included in firmware versions prior
to DH_IPC-Consumer-Zi-Themis_Eng_P_V2.408.0000.11.R.20170621 do not
validate input data length for the 'password' field of the web
interface. A remote, unauthenticated attacker may submit a crafted
POST request to the IP camera's Sonia web interface that may lead to
out-of-bounds memory operations and loss of availability or remote
code execution. The issue was originally identified by the researcher
in firmware version DH_IPC-
HX1X2X-Themis_EngSpnFrn_N_V2.400.0000.30.R.20160803.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.");
  script_set_attribute(attribute:"see_also", value:"https://www.dahuasecurity.com/aboutUs/trustedCenter/details/402");
  script_set_attribute(attribute:"see_also", value:"http://www.securityfocus.com/bid/99620");
  script_set_attribute(attribute:"see_also", value:"https://www.kb.cert.org/vuls/id/547255");
  script_set_attribute(attribute:"solution", value:
"Refer to the vendor advisory.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-3223");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(121);

  script_set_attribute(attribute:"vuln_publication_date", value:"2018/07/24");
  script_set_attribute(attribute:"patch_publication_date", value:"2018/07/24");
  script_set_attribute(attribute:"plugin_publication_date", value:"2024/07/29");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:dahuasecurity:dh-ipc-a15_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:dahuasecurity:dh-ipc-a35_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:dahuasecurity:dh-ipc-c15_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:dahuasecurity:dh-ipc-c35_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:dahuasecurity:dh-ipc-hdbw1120e-w_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:dahuasecurity:dh-ipc-hdbw1320e-w_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:dahuasecurity:dh-ipc-hfw1120s-w_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:dahuasecurity:dh-ipc-hfw1320s-w_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:dahuasecurity:dh-ipc-k15_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:dahuasecurity:dh-ipc-k15a_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:dahuasecurity:dh-ipc-k35_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:dahuasecurity:dh-ipc-k35a_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:dahuasecurity:dh-ipc-hdbw11a0en-w_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:dahuasecurity:dh-ipc-hdbw13a0en-w_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:dahuasecurity:dh-ipc-hfw11a0sn-w_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:dahuasecurity:dh-ipc-hfw13a0sn-w_firmware");
  script_set_attribute(attribute:"generated_plugin", value:"former");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Tenable.ot");

  script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("tenable_ot_api_integration.nasl");
  script_require_keys("Tenable.ot/DahuaSecurity");

  exit(0);
}


include('tenable_ot_cve_funcs.inc');

get_kb_item_or_exit('Tenable.ot/DahuaSecurity');

var asset = tenable_ot::assets::get(vendor:'DahuaSecurity');

var vuln_cpes = {
  "cpe:/o:dahuasecurity:dh-ipc-a15_firmware" :
    {"versionEndExcluding" : "v2.400.0000.14.r.20170713", "family" : "DahuaSecurity"},
  "cpe:/o:dahuasecurity:dh-ipc-a35_firmware" :
    {"versionEndExcluding" : "v2.400.0000.14.r.20170713", "family" : "DahuaSecurity"},
  "cpe:/o:dahuasecurity:dh-ipc-c15_firmware" :
    {"versionEndExcluding" : "v2.400.0000.14.r.20170713", "family" : "DahuaSecurity"},
  "cpe:/o:dahuasecurity:dh-ipc-c35_firmware" :
    {"versionEndExcluding" : "v2.400.0000.14.r.20170713", "family" : "DahuaSecurity"},
  "cpe:/o:dahuasecurity:dh-ipc-hdbw1120e-w_firmware" :
    {"versionEndExcluding" : "v2.400.0000.14.r.20170713", "family" : "DahuaSecurity"},
  "cpe:/o:dahuasecurity:dh-ipc-hdbw1320e-w_firmware" :
    {"versionEndExcluding" : "v2.400.0000.14.r.20170713", "family" : "DahuaSecurity"},
  "cpe:/o:dahuasecurity:dh-ipc-hfw1120s-w_firmware" :
    {"versionEndExcluding" : "v2.400.0000.14.r.20170713", "family" : "DahuaSecurity"},
  "cpe:/o:dahuasecurity:dh-ipc-hfw1320s-w_firmware" :
    {"versionEndExcluding" : "v2.400.0000.14.r.20170713", "family" : "DahuaSecurity"},
  "cpe:/o:dahuasecurity:dh-ipc-k15_firmware" :
    {"versionEndExcluding" : "v2.400.0000.14.r.20170713", "family" : "DahuaSecurity"},
  "cpe:/o:dahuasecurity:dh-ipc-k15a_firmware" :
    {"versionEndExcluding" : "v2.400.0000.14.r.20170713", "family" : "DahuaSecurity"},
  "cpe:/o:dahuasecurity:dh-ipc-k35_firmware" :
    {"versionEndExcluding" : "v2.400.0000.14.r.20170713", "family" : "DahuaSecurity"},
  "cpe:/o:dahuasecurity:dh-ipc-k35a_firmware" :
    {"versionEndExcluding" : "v2.400.0000.14.r.20170713", "family" : "DahuaSecurity"},
  "cpe:/o:dahuasecurity:dh-ipc-hdbw11a0en-w_firmware" :
    {"versionEndExcluding" : "v2.400.0000.14.r.20170713", "family" : "DahuaSecurity"},
  "cpe:/o:dahuasecurity:dh-ipc-hdbw13a0en-w_firmware" :
    {"versionEndExcluding" : "v2.400.0000.14.r.20170713", "family" : "DahuaSecurity"},
  "cpe:/o:dahuasecurity:dh-ipc-hfw11a0sn-w_firmware" :
    {"versionEndExcluding" : "v2.400.0000.14.r.20170713", "family" : "DahuaSecurity"},
  "cpe:/o:dahuasecurity:dh-ipc-hfw13a0sn-w_firmware" :
    {"versionEndExcluding" : "v2.400.0000.14.r.20170713", "family" : "DahuaSecurity"},
};

tenable_ot::cve::compare_and_report(asset:asset, cpes:vuln_cpes, severity:SECURITY_HOLE);

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8.2

Confidence

Low

Related for TENABLE_OT_DAHUASECURITY_CVE-2017-3223.NASL