{"vuid":"VU#251133","idnumber":"251133","name":"S2 NetBox allows unauthenticated HTTP access to node logs, backups, and employee photographs","keywords":["S2 Netbox","Linear eMerge","EDAC","Sonitrol eAccess"],"overview":"S2 NetBox and related products do not adequately restrict access to node logs, backups, and employee photographs. A remote, unauthenticated attacker could use information obtained from a vulnerable system to aid in further attacks.","clean_desc":"S2 NetBox is a line of \"...open architecture, scalable, IP network-ready products for the physical security industry that integrate access control, alarm monitoring, video surveillance, and temperature monitoring.\" S2 Netbox systems are operated entirely via a web interface. The Netbox web server does not properly authenticate access to several directories, allowing an unauthenticated attacker to access network node logs, employee photographs, and backup archives. Linear (formerly IEI) eMerge is based on S2 Netbox, and Sonitrol eAccess is based on Linear eMerge. eMerge and eAccess may also be affected by this vulnerability.","impact":"An unauthenticated, remote attacker can access node logs, backups, and employee photographs. An attacker may be able to crack passwords contained in a backup and gain administrative control over the system. Node logs and employee photographs could provide an attacker with reconnaissance information.","resolution":"Upgrade or patch\nS2 Security has made patches or upgrades available to address this vulnerability for Netbox versions 2.5, 3.3, and 4.0. Please contact  S2 or Linear customer support.","workarounds":"Restrict access Restrict network access to S2 Netbox systems to trusted and authorized hosts and networks. Separate management networks from general purpose user networks. Do not allow access from untrusted networks such as the internet.","sysaffected":"","thanks":"These vulnerabilities were researched and reported by Shawn Merdinger. Thanks to S2 Security for information used in this document.","author":"This document was written by Art Manion.","public":["http://www.s2sys.com/page/netbox/26","http://www.darkreading.com/blog/archives/2010/04/attacking_door.html","http://blip.tv/file/3414004","http://www.slideshare.net/shawn_merdinger/we-dont-need-no-stinkin-badges-hacking-electronic-door-access-controllersquot-shawn-merdinger-carolinacon"],"cveids":["CVE-2010-2466"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2010-03-05T21:44:55Z","publicdate":"2010-06-24T00:00:00Z","datefirstpublished":"2010-06-24T18:18:46Z","dateupdated":"2010-07-09T20:56:35Z","revision":32,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"4","cam_impact":"13","cam_easeofexploitation":"18","cam_attackeraccessrequired":"10","cam_scorecurrent":"2.6325","cam_scorecurrentwidelyknown":"3.51","cam_scorecurrentwidelyknownexploited":"7.02","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":2.6325,"vulnote":null}