Vulnerability identifier: #VU13385
Vulnerability risk: Low
CVSSv3.1: 9.1 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-264
Exploitation vector: Network
Exploit availability: Yes
Vulnerable software:
Axis Communications video cameras
Hardware solutions /
Firmware
Vendor: Axis Communications
Description
The vulnerability allows a remote attacker to gain elevated privileges on the target system.
The weakness exists due to the authorization mechanism that is intended to limit requests, PolicyKit, is configured to automatically grant access to requests originating from the root user. A remote attacker can use legitimate requests that reach /bin/ssid’s .srv functionality, choose one of several actions by setting the action parameter in the request’s query-string and invoke any dbus request as root (the uid and gid of the /bin/ssid process), without any restriction on the destination or content.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Axis Communications video cameras: All versions
External links
http://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras/
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.