{"vuid":"VU#785838","idnumber":"785838","name":"TVT TD-2308SS-B DVR contains a directory traversal vulnerability","keywords":["TVT","DVR","digital video recorder","directory traversal","CWE-22"],"overview":"TVT TD-2308SS-B DVR and possibly other models contain a directory traversal vulnerability (CWE-22).","clean_desc":"CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') TVT TD-2308SS-B DVR and possibly other models running firmware version 3.2.0.P-3520A-00 contain a directory traversal vulnerability. An attacker can use directory traversal to download critical files such as the config.dat file for the device which contains the credentials for the web interface. For example: http://[IP ADDRESS]/../../../mnt/mtd/config/config.dat This file can be parsed with the strings command to reveal the administrative user's plaintext credentials.","impact":"A remote unauthenticated attacker can download the configuration file of the device and use the obtained administrator credentials to access the web interface. The attacker may then modify the settings of the device and have access to the connected cameras.","resolution":"We are currently unaware of a practical solution to this problem. Please consider the following workaround.","workarounds":"Restrict access to the TVT DVR interface Restrict access to the TVT DVR web interface to trusted networks. If possible, configure management and transit networks for separate VLANs, or restrict access to the device using IP access lists.","sysaffected":"","thanks":"Thanks to Cesar Neira for reporting this vulnerability.","author":"This document was written by Adam Rauf.","public":["http://cwe.mitre.org/data/definitions/22.html","http://en.tvt.net.cn/product.aspx?TypeId=1","http://alguienenlafisi.blogspot.com/2013/10/dvr-tvt-directory-traversal.html"],"cveids":["CVE-2013-6023"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2013-09-09T12:32:30Z","publicdate":"2013-10-25T00:00:00Z","datefirstpublished":"2013-10-25T13:09:16Z","dateupdated":"2013-10-25T13:09:16Z","revision":18,"vrda_d1_directreport":"1","vrda_d1_population":"1","vrda_d1_impact":"2","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"M","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"N","cvss_availabilityimpact":"N","cvss_exploitablity":null,"cvss_remediationlevel":"W","cvss_reportconfidence":"UR","cvss_collateraldamagepotential":"L","cvss_targetdistribution":"L","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"4.3","cvss_basevector":"AV:N/AC:M/Au:N/C:P/I:N/A:N","cvss_temporalscore":"3.5","cvss_environmentalscore":"1","cvss_environmentalvector":"CDP:L/TD:L/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}