{"vuid":"VU#522460","idnumber":"522460","name":"SerVision HVG Video Gateway web interface contains multiple vulnerabilities","keywords":["servision","hvg","authentication bypass","privilege elevation","hardcoded password"],"overview":"SerVision HVG Video Gateway web interface contains multiple vulnerabilities affecting multiple firmware versions.","clean_desc":"CWE-288: Authentication Bypass Using an Alternate Path or Channel, and CWE-284: Improper Access Control - CVE-2015-0929\nBy visiting time.htm, a user is issued a cookie that grants administrative privileges in the Servision HVG web interface. There are two distinct impacts of this vulnerability: An unauthenticated user is able to bypass authentication. This is addressed in firmware version 2.2.26a78 and later. An authenticated user is able to elevate privileges. This is reportedly not addressed as of the current release, version 2.2.26a100. CWE-259: Use of Hard-Coded Password - CVE-2015-0930 SerVision HVG contains a hardcoded password that enables a user to log into the web interface with administrative rights. This is addressed in firmware version 2.2.26a100.","impact":"A remote, unauthenticated user may be able to gain administrative privileges on the device.","resolution":"Apply an upgrade Users are encouraged to update their firmware to version 2.2.26a100. Those unable to update should consider the following workaround.","workarounds":"Restrict access As a general good security practice, only allow connections from trusted hosts and networks. Appropriate firewall rules which block incoming connections from untrusted networks would likely prevent an external attacker from accessing the device. Note that this does not address the issue of trusted, authenticated users accessing time.htm and gaining elevated privileges.","sysaffected":"","thanks":"Thanks to Richard Tafoya for reporting this vulnerability.","author":"This document was written by Joel Land.","public":["http://cwe.mitre.org/data/definitions/288.html","http://cwe.mitre.org/data/definitions/284.html","http://cwe.mitre.org/data/definitions/259.html","http://www.servision.net/downloads/"],"cveids":["CVE-2015-0929","CVE-2015-0930"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2014-11-26T15:53:58Z","publicdate":"2015-02-02T00:00:00Z","datefirstpublished":"2015-02-02T17:37:05Z","dateupdated":"2015-02-02T19:36:19Z","revision":23,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"C","cvss_integrityimpact":"C","cvss_availabilityimpact":"C","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"UR","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"10","cvss_basevector":"AV:N/AC:L/Au:N/C:C/I:C/A:C","cvss_temporalscore":"7.9","cvss_environmentalscore":"5.885570543832","cvss_environmentalvector":"CDP:ND/TD:M/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}