Vulnerability Note VU#555984

Avigilon Control Center is vulnerable to path traversal

Original Release date: 10 Jun 2015 | Last revised: 10 Jun 2015


The Avigilon Control Center (ACC) is a server software for security and surveillance systems. The ACC Server is vulnerable to a path traversal attack, allowing an attacker to access any file on the server.


CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') - CVE-2015-2860

The /help/ path of a URL to an ACC Server is improperly parsed, allowing an attacker to perform a path traversal to access any file on the underlying system.


An unauthenticated remote attacker may access any file on the underlying system running ACC Server.


Apply an update

Avigilon has released updates addressing this issue in affected products; users are encouraged to update as soon as possible. For ACC Server version 5, please update to or later. For ACC Server version 4, please update to or later.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
AvigilonAffected11 May 201510 Jun 2015
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base 7.8 AV:N/AC:L/Au:N/C:C/I:N/A:N
Temporal 6.1 E:POC/RL:OF/RC:C
Environmental 4.6 CDP:ND/TD:M/CR:ND/IR:ND/AR:ND



Thanks to Jürgen Bilberger for reporting this vulnerability, and to Avigilon for quickly addressing this issue.

This document was written by Garret Wassermann.

Other Information

  • CVE IDs: CVE-2015-2860
  • Date Public: 08 Jun 2015
  • Date First Published: 10 Jun 2015
  • Date Last Updated: 10 Jun 2015
  • Document Revision: 29


If you have feedback, comments, or additional information about this vulnerability, please send us email.