Multiple vulnerabilities in TONNET TAT-76 and TAT-77 series of products



Published: 2020-03-04
Risk High
Patch available NO
Number of vulnerabilities 2
CVE-ID CVE-2020-3923
CVE-2020-3924
CWE-ID CWE-284
CWE-77
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
TAT-77104G1
Hardware solutions / Other hardware appliances

TAT-70432N
Hardware solutions / Other hardware appliances

TAT-71416G1
Hardware solutions / Other hardware appliances

TAT-71832G1
Hardware solutions / Other hardware appliances

TAT-76104G3
Hardware solutions / Other hardware appliances

TAT-76108G3
Hardware solutions / Other hardware appliances

TAT-76116G3
Hardware solutions / Other hardware appliances

TAT-76132G3
Hardware solutions / Other hardware appliances

Vendor Tonnet

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Improper access control

EUVDB-ID: #VU25769

Risk: High

CVSSv3.1: 9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C]

CVE-ID: CVE-2020-3923

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to misconfigured authentication mechanism in DVR firmware. A remote attacker can bypass implemented security restrictions and gain unauthorized access to the application.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

TAT-77104G1: 20190107

TAT-70432N: 20181225

TAT-71416G1: 20181225

TAT-71832G1: 20190510

TAT-76104G3: 76104G3

TAT-76108G3: 76208G3

TAT-76116G3: 76216G3

TAT-76132G3: 20181221-1

External links

http://tvn.twcert.org.tw/taiwanvn/TVN-201910003
http://www.chtsecurity.com/news/4ef5eb3a-fdc3-4d78-8dd7-ec7213e2bbcf


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Command Injection

EUVDB-ID: #VU25770

Risk: High

CVSSv3.1: 9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C]

CVE-ID: CVE-2020-3924

CWE-ID: CWE-77 - Command injection

Exploit availability: No

Description

The vulnerability allows a remote user to execute arbitrary commands on the system.

The vulnerability exists due to the DVR firmware does not properly verify patch files. A remote attacker can inject a specific command into a patch file and gain access to the system.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

TAT-77104G1: 20190107

TAT-70432N: 20181225

TAT-71416G1: 20181225

TAT-71832G1: 20190510

TAT-76104G3: 76104G3

TAT-76108G3: 76208G3

TAT-76116G3: 76216G3

TAT-76132G3: 20181221-1

External links

http://tvn.twcert.org.tw/taiwanvn/TVN-201910004
http://www.chtsecurity.com/news/4ef5eb3a-fdc3-4d78-8dd7-ec7213e2bbcf


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###