Vulnerability Note VU#555984
Avigilon Control Center is vulnerable to path traversal
The Avigilon Control Center (ACC) is a server software for security and surveillance systems. The ACC Server is vulnerable to a path traversal attack, allowing an attacker to access any file on the server.
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') - CVE-2015-2860
The /help/ path of a URL to an ACC Server is improperly parsed, allowing an attacker to perform a path traversal to access any file on the underlying system.
An unauthenticated remote attacker may access any file on the underlying system running ACC Server.
Apply an update
Vendor Information (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Avigilon||Affected||11 May 2015||10 Jun 2015|
CVSS Metrics (Learn More)
Thanks to Jürgen Bilberger for reporting this vulnerability, and to Avigilon for quickly addressing this issue.
This document was written by Garret Wassermann.
- CVE IDs: CVE-2015-2860
- Date Public: 08 Jun 2015
- Date First Published: 10 Jun 2015
- Date Last Updated: 10 Jun 2015
- Document Revision: 29
If you have feedback, comments, or additional information about this vulnerability, please send us email.