CWE
255
Advisory Published
Updated

CVE-2017-8229

First published: Wed Jul 03 2019(Updated: )

Amcrest IPM-721S V2.420.AC00.16.R.20160909 devices allow an unauthenticated attacker to download the administrative credentials. If the firmware version V2.420.AC00.16.R 9/9/2016 is dissected using binwalk tool, one obtains a _user-x.squashfs.img.extracted archive which contains the filesystem set up on the device that many of the binaries in the /usr folder. The binary "sonia" is the one that has the vulnerable function that sets up the default credentials on the device. If one opens this binary in IDA-pro one will notice that this follows a ARM little endian format. The function sub_436D6 in IDA pro is identified to be setting up the configuration for the device. If one scrolls to the address 0x000437C2 then one can see that /current_config is being set as an ALIAS for /mnt/mtd/Config folder on the device. If one TELNETs into the device and navigates to /mnt/mtd/Config folder, one can observe that it contains various files such as Account1, Account2, SHAACcount1, etc. This means that if one navigates to http://[IPofcamera]/current_config/Sha1Account1 then one should be able to view the content of the files. The security researchers assumed that this was only possible only after authentication to the device. However, when unauthenticated access tests were performed for the same URL as provided above, it was observed that the device file could be downloaded without any authentication.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Amcrest Ipm-721s Firmware<=2.420.ac00.16.r.20160909
Amcrest IPM-721S

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2017-8229?

    CVE-2017-8229 is a vulnerability that allows an unauthenticated attacker to download the administrative credentials of Amcrest IPM-721S V2.420.AC00.16.R.20160909 devices.

  • How severe is CVE-2017-8229?

    CVE-2017-8229 has a severity rating of 9.8, which is considered critical.

  • Which software versions are affected by CVE-2017-8229?

    Amcrest IPM-721S V2.420.AC00.16.R.20160909 firmware is affected by CVE-2017-8229.

  • How can an attacker exploit CVE-2017-8229?

    An attacker can exploit CVE-2017-8229 by dissecting the firmware version V2.420.AC00.16.R 9/9/2016 using the binwalk tool and obtaining the administrative credentials.

  • Are all versions of Amcrest IPM-721S vulnerable to CVE-2017-8229?

    No, only the firmware version V2.420.AC00.16.R 9/9/2016 of Amcrest IPM-721S is vulnerable to CVE-2017-8229.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203