search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Avigilon Control Center is vulnerable to path traversal

Vulnerability Note VU#555984

Original Release Date: 2015-06-10 | Last Revised: 2015-06-10

Overview

The Avigilon Control Center (ACC) is a server software for security and surveillance systems. The ACC Server is vulnerable to a path traversal attack, allowing an attacker to access any file on the server.

Description

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') - CVE-2015-2860

The /help/ path of a URL to an ACC Server is improperly parsed, allowing an attacker to perform a path traversal to access any file on the underlying system.

Impact

An unauthenticated remote attacker may access any file on the underlying system running ACC Server.

Solution

Apply an update

Avigilon has released updates addressing this issue in affected products; users are encouraged to update as soon as possible. For ACC Server version 5, please update to 5.4.2.22 or later. For ACC Server version 4, please update to 4.12.0.54 or later.

Vendor Information

555984
 

Avigilon Affected

Notified:  May 11, 2015 Updated: June 10, 2015

Statement Date:   May 12, 2015

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

Avigilon has released updates addressing this issue in affected products; users are encouraged to update as soon as possible. For ACC Server version 5, please update to 5.4.2.22 or later. For ACC Server version 4, please update to 4.12.0.54 or later.


CVSS Metrics

Group Score Vector
Base 7.8 AV:N/AC:L/Au:N/C:C/I:N/A:N
Temporal 6.1 E:POC/RL:OF/RC:C
Environmental 4.6 CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

Acknowledgements

Thanks to Jürgen Bilberger for reporting this vulnerability, and to Avigilon for quickly addressing this issue.

This document was written by Garret Wassermann.

Other Information

CVE IDs: CVE-2015-2860
Date Public: 2015-06-08
Date First Published: 2015-06-10
Date Last Updated: 2015-06-10 16:09 UTC
Document Revision: 30

Sponsored by CISA.