Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2017-8229

Опубликовано: 03 июл. 2019
Источник: nvd
CVSS3: 9.8
CVSS2: 5
EPSS Критический

Описание

Amcrest IPM-721S V2.420.AC00.16.R.20160909 devices allow an unauthenticated attacker to download the administrative credentials. If the firmware version V2.420.AC00.16.R 9/9/2016 is dissected using binwalk tool, one obtains a _user-x.squashfs.img.extracted archive which contains the filesystem set up on the device that many of the binaries in the /usr folder. The binary "sonia" is the one that has the vulnerable function that sets up the default credentials on the device. If one opens this binary in IDA-pro one will notice that this follows a ARM little endian format. The function sub_436D6 in IDA pro is identified to be setting up the configuration for the device. If one scrolls to the address 0x000437C2 then one can see that /current_config is being set as an ALIAS for /mnt/mtd/Config folder on the device. If one TELNETs into the device and navigates to /mnt/mtd/Config folder, one can observe that it contains various files such as Account1, Account2, SHAACcount1, etc. This means that

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:amcrest:ipm-721s_firmware:*:*:*:*:*:*:*:*
Версия до 2.420.ac00.16.r.20160909 (включая)
cpe:2.3:h:amcrest:ipm-721s:-:*:*:*:*:*:*:*

EPSS

Процентиль: 100%
0.92899
Критический

9.8 Critical

CVSS3

5 Medium

CVSS2

Дефекты

CWE-255

Связанные уязвимости

CVSS3: 9.8
github
больше 3 лет назад

Amcrest IPM-721S V2.420.AC00.16.R.20160909 devices allow an unauthenticated attacker to download the administrative credentials. If the firmware version V2.420.AC00.16.R 9/9/2016 is dissected using binwalk tool, one obtains a _user-x.squashfs.img.extracted archive which contains the filesystem set up on the device that many of the binaries in the /usr folder. The binary "sonia" is the one that has the vulnerable function that sets up the default credentials on the device. If one opens this binary in IDA-pro one will notice that this follows a ARM little endian format. The function sub_436D6 in IDA pro is identified to be setting up the configuration for the device. If one scrolls to the address 0x000437C2 then one can see that /current_config is being set as an ALIAS for /mnt/mtd/Config folder on the device. If one TELNETs into the device and navigates to /mnt/mtd/Config folder, one can observe that it contains various files such as Account1, Account2, SHAACcount1, etc. This means t...

EPSS

Процентиль: 100%
0.92899
Критический

9.8 Critical

CVSS3

5 Medium

CVSS2

Дефекты

CWE-255