Information disclosure in TBK DVR



Published: 2018-05-22 | Updated: 2023-09-27
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2018-9995
CWE-ID CWE-287
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
Subscribe
TBK DVR4104
Hardware solutions / Firmware

TBK DVR4216
Hardware solutions / Firmware

Vendor TBK Vision

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Improper authentication

EUVDB-ID: #VU12890

Risk: Low

CVSSv3.1: 6.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C]

CVE-ID: CVE-2018-9995

CWE-ID: CWE-287 - Improper Authentication

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The weakness exists due to improper authentication. A remote attacker can bypass authentication via a "Cookie: uid=admin" header, as demonstrated by a device.rsp?opt=user&cmd=list request that provides credentials within JSON data in a response.

Mitigation

Install update from vendor's website.

Vulnerable software versions

TBK DVR4104: All versions

TBK DVR4216: All versions

External links

http://misteralfa-hack.blogspot.cl/2018/04/tbk-vision-dvr-login-bypass.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###