#VU13385 Privilege escalation in Axis Communications video cameras


Published: 2020-03-18

Vulnerability identifier: #VU13385

Vulnerability risk: Low

CVSSv3.1: 9.1 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C]

CVE-ID: CVE-2018-10662

CWE-ID: CWE-264

Exploitation vector: Network

Exploit availability: Yes

Vulnerable software:
Axis Communications video cameras
Hardware solutions / Firmware

Vendor: Axis Communications

Description

The vulnerability allows a remote attacker to gain elevated privileges on the target system.

The weakness exists due to the authorization mechanism that is intended to limit requests, PolicyKit, is configured to automatically grant access to requests originating from the root user. A remote attacker can use legitimate requests that reach /bin/ssid’s .srv functionality, choose one of several actions by setting the action parameter in the request’s query-string and invoke any dbus request as root (the uid and gid of the /bin/ssid process), without any restriction on the destination or content.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Axis Communications video cameras: All versions


External links
http://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.


Latest bulletins with this vulnerability