Sony Patches Remotely Exploitable Vulnerabilities in Network Cameras

Two serious, remotely exploitable vulnerabilities in Sony IPELA E Series Network Camera products could allow attackers to execute commands or arbitrary code on affected devices.  Tracked as CVE-2018-3937, the first of the vulnerabilities is a command injection flaw in the measurementBitrateExec functionality of the IPELA E Series Network Camera. These are network facing devices used for monitoring and surveillance. The issue was discovered by Cory Duplantis and Claudio Bozzato of Cisco Talos, who explainthat arbitrary commands could be executed via a specially crafted GET request. An attacker looking to trigger the vulnerability could simply send an HTTP request for that. “While parsing the input measurement string, there isn't a check on the server address (-c). In this manner, any string can be placed as the server address and will be executed via system. Knowing this, an attacker can execute arbitrary commands in the position of the server address,” the researchers explain.  The second vulnerability is tracked as CVE-2018-3938 and affects the 802dot1xclientcert.cgi functionality of IPELA E Series Camera devices. “A specially crafted POST can cause a stack-based buffer overflow, resulting in remote code execution. An attacker can send a malicious POST request to trigger this vulnerability,” Cisco says.

Spotlight

Other News

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More

Spotlight

Resources