search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Samsung Web Viewer for Samsung DVR allows authentication bypass and password disclosure

Vulnerability Note VU#882286

Original Release Date: 2013-08-21 | Last Revised: 2013-10-03

Overview

Samsung Web Viewer for Samsung DVR contains multiple vulnerabilities including: Cleartext Storage in a File or on Disk (CWE-313) and Authentication Bypass by Assumed-Immutable Data (CWE-302).

Description

CWE-313: Cleartext Storage in a File or on Disk - CVE-2013-3585

Web Viewer for Samsung DVR stores user credentials in plaintext allowing an attacker to parse saved credentials on the user setup webpage.

CWE-302: Authentication Bypass by Assumed-Immutable Data - CVE-2013-3586
Web Viewer for Samsung DVR contains a vulnerability in its cookie-handling procedure that accepts any input as a valid session ID if placed after SessionID=. This allows an attacker to send a specially crafted cookie containing an malicious SessionID to the web server which bypasses authentication and can provide access to internal pages, including camera controls and account settings.

For example:
headers = { "Cookie": "=", "Accept": "text/plain"}

The CVSS score below reflects the authentication bypass attack.

Impact

A remote unauthenticated attacker may be able to retrieve the device's administrator password, allowing them to directly access the device's configuration web page or system password configuration files.

Solution

Apply an Update

Samsung has released updated firmware. Please see their statement on the Vendor Information page.

If applying an update is not possible, please consider the following workaround.

Restrict access to the Samsung Web Viewer for Samsung DVR interface

Restrict access to the Samsung DVR Web Viewer interface to trusted networks. If possible, configure management and transit networks for separate VLANs, or restrict access to the device using IP access lists.

Vendor Information

882286
 

Samsung Affected

Notified:  June 05, 2013 Updated: October 03, 2013

Status

Affected

Vendor Statement

Pursuant to the security vulnerability issue identified in CERT security notification VU#882286 Samsung Techwin has developed and released firmware to address said vulnerability by removing the cookie upon user log-out.

The affected models, firmware versions and URL links are listed below. The firmware download and installation process is contained in the product User Manual. Technical support is available at 1-877-213-1222 and at the Samsung website, https://www.samsung-security.com/

 
Model

Uploaded F/W

F/W Download URL Link (click F/W tab)


SRD-1640/840

srd-164x-t1-pkg_v1.20h_130905211340.img

https://www.samsung-security.com/en/products/video-recording-and-management/dvr/16-channel/SRD-1640.aspx


SRD-440/442

srd-440x-t1-pkg_v1.20h_130905211626.img

https://www.samsung-security.com/products/video-recording-and-management/dvr/4-channel/SRD-440.aspx


SRD-1670/1650/870/850

srd-167x-t7-pkg_v1.30h_130906171722.img

https://www.samsung-security.com/products/video-recording-and-management/dvr/16-channel/SRD-1670DC.aspx


SRD-1630/830/1610

srd-163x-t7-pkg_v1.30h_130906171722.img

https://www.samsung-security.com/products/video-recording-and-management/dvr/16-channel/SRD-1630D.aspx


SRD-470

srd-470x-t7-pkg_v1.30h_130906171722.img

https://www.samsung-security.com/products/video-recording-and-management/dvr/4-channel/SRD-470D.aspx


SRD-1652D/852D

srd-165x-t7-pkg_v1.30h_130906171813.img

https://www.samsung-security.com/products/video-recording-and-management/dvr/16-channel/SRD-1652D.aspx


SRD-1673/873/1653

srd-1673-t1-pkg_v1.20h_130909203036.img

https://www.samsung-security.com/products/video-recording-and-management/dvr/16-channel/SRD-1673D.aspx


SRD-1654/854/473**

srd-1654-t1-pkg_v1.10h_130909203103.img

http://www.samsungsecurity.com/product/product_view.asp?idx=6922&cid=64&clvl=0#FL060000

** This models series is not released in the North America market.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References


CVSS Metrics

Group Score Vector
Base 7.6 AV:N/AC:H/Au:N/C:C/I:C/A:C
Temporal 5.4 E:POC/RL:OF/RC:UC
Environmental 4.1 CDP:N/TD:M/CR:ND/IR:ND/AR:ND

References

Acknowledgements

Thanks to Andrey Bezborodov for reporting this vulnerability.

This document was written by Adam Rauf.

Other Information

CVE IDs: CVE-2013-3585, CVE-2013-3586
Date Public: 2013-08-21
Date First Published: 2013-08-21
Date Last Updated: 2013-10-03 19:14 UTC
Document Revision: 35

Sponsored by CISA.