Security Advisory

3y ago
52 Views
2 Downloads
363.67 KB
6 Pages
Last View : 11d ago
Last Download : 3m ago
Upload by : Milena Petrie
Transcription

Security Advisory IP Camera Vulnerability – December 20181 6Security AdvisoryIP Camera Vulnerability – 12. December 2018CVE-2018-19036 (CVSS v3 Base Score: 9.4)1 Overview and Management SummaryA recently discovered security vulnerability affects several Bosch IP cameras. It potentially allows the unauthorizedexecution of code on the device via the network interface. Bosch rates this vulnerability at 9.4 (Critical) and recommendscustomers to upgrade devices with updated firmware versions.As of 2018-12-11, updated firmware files are published on the Bosch Download Store (Link).As of 2018-12-12, there is currently no indication that the exploitation code is either publicly known or utilized.If a firmware update is not possible in a timely manner, a reduction in the devices’ network exposure is advised. Internetaccessible Bosch IP cameras should be firewalled, whilst additional steps like network isolation by VLAN, IP filteringfeatures of the devices and other technologies should be used to decrease the exposure of vulnerable devices.The vulnerability was discovered and disclosed to Bosch in a coordinated manner by the external researcher, VDOO.2 Technical Details2.1Vulnerability Classification and Solution ApproachThis vulnerability is classified as ‘buffer overflow’, located in the RCP parser of the webserver. It is accordingly ranked as“CWE-120: Buffer Copy without Checking Size of Input”. The parser fix utilizes additional input and target-buffers checks.The vulnerability resides in the firmware since version 6.32. Prior firmware versions are considered unaffected.2.2CVSS RatingThe CVSS V3 Base Score is rated at: 9.4 (Critical) actThe vulnerability can be used to remotely execute code on the device (RCE). This would enable a potential attacker, forexample, to bypass access restrictions (e.g. username / password) or to reactivate disabled features (e.g. telnet). Anecessary prerequisite for this attack is the network access to the webserver (HTTP / HTTPS) of the device. Despite itscritical rating, possible attacks are considered incapable of accessing private keys if they are stored on the devices’ TrustedPlatform Module (TPM). An affected camera can be restored to its original state by the factory reset button.3 Vulnerability Fix3.1Firmware Updates (Device)The recommended approach is to update the firmware of affected Bosch IP cameras to a fixed version. If an update is notpossible in a timely manner, the mitigation approaches Certificate Based Authentication, Firewalling, and IP Filtering can beutilized. A list of affected devices and fixed firmware versions is available in appendix A of this document.4 Mitigations and Workarounds4.1Certificate Based Authentication (Device)Starting with Release 6.40.0240, the “unauthenticated” aspect of the vulnerability can be mitigated to “authenticated” byenabling certificate-based authentication and executing additional hardening steps. After an initial certificate authenticationData subject to change without notice December 2018BT-SC/MKP8.1

Security Advisory IP Camera Vulnerability – December 20182 6setup, additional hardening is mandatory for secure operation: Disable port 80, disable HSTS-redirect, and disablepassword authentication. This enforces the webserver to demand a valid client-certificate during the initial TLS-Handshake.4.2Firewalling (Network)It is also advised that the devices should not be exposed directly to the internet or other insecure networks. This includesport-forwarding, which would not protect devices adequately. Firewalling a device significantly reduces its attack surface.4.3IP Filtering (Device)As further supporting measure in shared environments, the devices’ internal IP filter can be activated. It allows the deviceto whitelist IPs and IP-ranges. IPs not included in these ranges cannot connect, and therefore not exploit this vulnerability.5 BVMSFor the Bosch Video Management System (BVMS) the following fixed firmware versions are 0276.51.00286.51.00286.51.00286 Direct LinksFirmware dex.php?type FWHardening s/Data Security Guideb Special enUS 9007221590612491.pdfSecurity pb/security advisories/bosch-2018-1202-bt-cve-201819036 security advisory ip camera vulnerability.pdfBVMS compatibility 77995/attachments/varuj77995/bt compatibility.pdf7 Document Changelog2018.12.12 – Revision 1.02: Initial Release2018.12.12 – Revision 1.03: Updated FW Versions2018.12.21 – Revision 1.04: Added Exclusive EXTEGRA FW Versionssigned bypki, BOSCH, Digitallypki, BOSCH, DE, B,T, BT.ProVIRTDE, B, T,Date: 2019.02.13BT.ProVIRT 16:47:21 01'00'Data subject to change without notice December 2018BT-SC/MKP8.1

Security Advisory IP Camera Vulnerability – December 20183 6Appendix A: List of Affected Hardware and fixed FirmwareCommon Product Platform 7.3 (CPP7.3)Product familyFirmware VersionAUTODOME IP 4000iAUTODOME IP 5000iAUTODOME IP starlight 5000i (IR)AUTODOME IP starlight 7000iDINION IP bullet 4000iDINION IP bullet 5000iDINION IP bullet 6000i6.51.00286.50.01336.44.0027FLEXIDOME IP 4000iFLEXIDOME IP 5000iMIC IP starlight 7000iMIC IP fusion 9000iCommon Product Platform 7 (CPP7)Product familyFirmware VersionDINION IP starlight 6000DINION IP starlight 7000FLEXIDOME IP starlight 6000FLEXIDOME IP starlight 70006.51.00286.50.01336.44.0027DINION IP thermal 8000Data subject to change without notice December 2018BT-SC/MKP8.1

Security Advisory IP Camera Vulnerability – December 20184 6Common Product Platform 6 (CPP6)Product familyFirmware VersionDINION IP starlight 8000 12MPDINION IP ultra 8000 12MPDINION IP ultra 8000 12MP with C/CS mount telephoto lensFLEXIDOME IP panoramic 7000 12MP 180FLEXIDOME IP panoramic 7000 12MP 360FLEXIDOME IP panoramic 7000 12MP 180 IVAFLEXIDOME IP panoramic 7000 12MP 360 IVA6.51.00286.50.01336.44.0027AVIOTEC IP starlight 8000FLEXIDOME IP panoramic 6000 12MP 180FLEXIDOME IP panoramic 6000 12MP 360FLEXIDOME IP panoramic 6000 12MP 180 IVAFLEXIDOME IP panoramic 6000 12MP 360 IVAData subject to change without notice December 2018BT-SC/MKP8.1

Security Advisory IP Camera Vulnerability – December 20185 6Common Product Platform 4 (CPP4)Product familyFirmware VersionAUTODOME IP 4000 HDAUTODOME IP 5000 HDAUTODOME IP 5000 IRAUTODOME IP 7000 seriesDINION HD 1080pDINION HD 1080p HDRDINION HD 720pDINION imager 9000 HDDINION IP bullet 4000DINION IP bullet 5000DINION IP 4000 HDDINION IP 5000 HDDINION IP 5000 MPDINION IP starlight 7000 HDEXTEGRA IP dynamic 9000EXTEGRA IP starlight 90006.51.00286.50.01336.44.0027FLEXIDOME corner 9000 MPFLEXIDOME HD 1080pFLEXIDOME HD 1080p HDRFLEXIDOME HD 720pVandal-proof FLEXIDOME HD 1080pVandal-proof FLEXIDOME HD 1080p HDRVandal-proof FLEXIDOME HD 720pFLEXIDOME IP panoramic 5000FLEXIDOME IP indoor 5000 HDFLEXIDOME IP indoor 5000 MPFLEXIDOME IP indoor 4000 HDFLEXIDOME IP indoor 4000 IRFLEXIDOME IP outdoor 4000 HDFLEXIDOME IP outdoor 4000 IRData subject to change without notice December 2018BT-SC/MKP8.1

Security Advisory IP Camera Vulnerability – December 20186 6Common Product Platform 4 (CPP4)Product familyFirmware VersionFLEXIDOME IP micro 5000 HDFLEXIDOME IP micro 5000 MPFLEXIDOME IP outdoor 5000 HDFLEXIDOME IP outdoor 5000 MPFLEXIDOME IP micro 2000 HDFLEXIDOME IP micro 2000 IPIP bullet 4000 HDIP bullet 5000 HD6.51.00286.50.01336.44.0027IP micro 2000IP micro 2000 HDMIC IP dynamic 7000MIC IP starlight 7000TINYON IP 2000 familyCommon Product Platform 4 (CPP4) Exclusive VersionsProduct familyFirmware VersionEXTEGRA IP dynamic 90006.32.0124EXTEGRA IP starlight 9000Data subject to change without notice December 2018BT-SC/MKP8.1

AUTODOME IP 5000i AUTODOME IP starlight 5000i (IR) AUTODOME IP starlight 7000i DINION IP bullet 4000i DINION IP bullet 5000i DINION IP bullet 6000i FLEXIDOME IP 4000i FLEXIDOME IP 5000i MIC IP starlight 7000i MIC IP fusion 9000i Common Product Platform 7 (CPP7) Product family Firmware Version DINION IP starlight 6000 6.51.0028 6.50.0133

Related Documents:

Reporting to the Behavioral Health Advisory Board The Advisory Board provides input to the administration of the Mental Health Plan and functions in an advisory capacity. The Advisory Board is involved in the Quality Improvement Committee by appointing an Advisory Board member to the QIC. In addition, there is a direct reporting link to each of .

Advisory Guide Your School, Your Schedule Building Blocks for Your Advisory Program Second Step Middle School was developed with advisory in mind. We know about two-thirds of all . Second Step Middle School not only helps you teach kids the essential social-emotional skills they need—it also gives you the resources to build an advisory .

AVG Internet Security 9 ESET Smart Security 4 F-Secure Internet Security 2010 Kaspersky Internet Security 2011 McAfee Internet Security Microsoft Security Essentials Norman Security Suite Panda Internet Security 2011 Sunbelt VIPRE Antivirus Premium 4 Symantec Norton Internet Security 20

Software Vulnerability Manager 2019 R5 On-Premises Editio n (December 2019) Company Confidential. 9. CVE Search in Advisory Smart Groups. In Software Vulnerability Manager 2019 R4, you can now search for an advisory using CVE. To see the list of all advisories, select the . Results Advisory Smart Groups Configured Advisory Groups

Feb 24, 2021 · FIN-2021-A002 February 24, 2021 Advisory on Financial Crimes Targeting COVID-19 Economic Impact Payments Detecting, preventing, and reporting financial crimes related to Economic Impact . 9. FinCEN Advisory, FIN-2020-A007, “Advisory on Unemployment Insurance Fraud During the Coronavirus Disease 2019 (

Technical advisory board member, DELL/EMC, since 2017. Advisory Board Chair, Jilin University, China, since 2015. Advisory Board Member, Open Innovation Center, Samsung Semiconductor, Inc. since 2012-2016. Advisory board member , The Technion Computing Engineering Ce

company of The Advisory Board Company and its products and services, or (b) an endorsement of the company or its products or services by The Advisory Board Company. The Advisory Board Company is not affiliated with any such company. IMPORTANT: Please read the following. The Advisory Board Company has prepared this report

Establish Client Advisory Boards: Some partners have established client advisory boards to receive guidance directly from the clients on a regular basis. These advisory boards can advise on a wide-range of topics from type of food and quantity as well as outreach methods. You can also give your advisory board voting