SCADA Vulnerabilities & Exposures (SVE)

CRITIFENCE® SCADA Vulnerabilities and Exposures Database (SVE)

[SVE-809475959] Geutebruck IP Cameras

Date Type Platform Author EDB-ID CVE-ID OSVDB-ID Download App SIS Signature
2018-03-20OtherGeutebrückDavy Douhine of RandoriSec and Nicolas Mattiocco of Greenlock reported these vulnerabilities to NCCIC.N/ACVE-2018-7532 CVE-2018-7528 CVE-2018-7524 CVE-2018-7520 CVE-2018N/AN/AN/A

Source

						
							
								
#
# Geutebruck IP Cameras
#


### VULNERABLE VENDOR
Geutebrück


### VULNERABLE PRODUCT
IP Cameras 


### RESEARCHER
Davy Douhine of RandoriSec and Nicolas Mattiocco of Greenlock reported these vulnerabilities to NCCIC.


### AFFECTED PRODUCTS
Geutebrück reports that the vulnerabilities affect the following IP cameras:

G-Cam/EFD-2250 (part n° 5.02024) firmware version 1.12.0.4, and
Topline TopFD-2125 (part n° 5.02820)  firmware version 3.15.1



### IMPACT
Successful exploitation of these vulnerabilities could lead to proxy network scans, access to a database, adding an unauthorized user to the system, full configuration download including passwords, and remote code execution.


### VULNERABILITY OVERVIEW
IMPROPER AUTHENTICATION CWE-287
Unauthentication vulnerabilities have been identified, which may allow remote code execution.
CVE-2018-7532 has been assigned to this vulnerability.
A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)


IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89
An SQL injection vulnerability has been identified, which may allow an attacker to alter stored data.
CVE-2018-7528 has been assigned to this vulnerability.
A CVSS v3 base score of 9.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)


CROSS-SITE REQUEST FORGERY (CSRF) CWE-352
A cross-site request forgery vulnerability has been identified, which may allow an unauthorized user to be added to the system.
CVE-2018-7524 has been assigned to this vulnerability.
A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)


IMPROPER ACCESS CONTROL CWE-284
An improper access control vulnerability has been identified, which could allow a full configuration download, including passwords.
CVE-2018-7520 has been assigned to this vulnerability.
A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)


SERVER-SIDE REQUEST FORGERY (SSRF) CWE-918
A server-side request forgery vulnerability has been identified, which could lead to proxied network scans.
CVE-2018-7516 has been assigned to this vulnerability.
A CVSS v3 base score of 8.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L)


IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79
A cross-site scripting vulnerability has been identified, which may allow remote code execution.
CVE-2018-7512 has been assigned to this vulnerability.
A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)





### BACKGROUND
Critical Infrastructure Sectors: Commercial Facilities, Energy, Healthcare, Financial Services and Public Health
Countries/Areas Deployed: Europe, United States, Australia
Company Headquarters Location: Windhagen, Germany




### MITIGATION

Geutebrück recommends G-Cam/EFD-2250 users download and update to the newest firmware version, 1.12.0.19, by registering for a new WebClub account, or by logging into an existing account at the following location:

https://www.geutebrueck.com//en_EN/login.html


Topline users can visit the previous link for workaround advice and contact information regarding the vulnerabilities associated with the device.