All the vulnerabilites related to Milestone Systems - XProtect VMS
cve-2024-3506
Vulnerability from cvelistv5
Published
2024-10-08 10:00
Modified
2024-10-08 13:50
Severity ?
7.3 (High) - CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:L/SC:L/SI:L/SA:L
6.7 (Medium) - CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L
6.7 (Medium) - CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L
EPSS score ?
Summary
A possible buffer overflow in selected cameras' drivers from XProtect Device Pack can allow an attacker with access to internal network to execute commands on Recording Server under strict conditions.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Milestone Systems | XProtect VMS |
Version: 0 < |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:milestone_systems:xprotect_vms:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "xprotect_vms", "vendor": "milestone_systems", "versions": [ { "lessThanOrEqual": "13.1a", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-3506", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-08T13:47:50.529517Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-08T13:50:58.073Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "device driver" ], "packageName": "Device Pack", "platforms": [ "Windows" ], "product": "XProtect VMS", "vendor": "Milestone Systems", "versions": [ { "lessThanOrEqual": "13.1a", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "datePublic": "2024-10-08T10:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A possible buffer overflow in selected cameras\u0027 drivers from XProtect Device Pack can allow an attacker with access to internal network to execute commands on Recording Server under strict conditions.\u0026nbsp;" } ], "value": "A possible buffer overflow in selected cameras\u0027 drivers from XProtect Device Pack can allow an attacker with access to internal network to execute commands on Recording Server under strict conditions." } ], "exploits": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "No public PoC or exploit \nis known.\n\n\u003cbr\u003e" } ], "value": "No public PoC or exploit \nis known." } ], "impacts": [ { "capecId": "CAPEC-100", "descriptions": [ { "lang": "en", "value": "CAPEC-100 Overflow Buffers" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "attackVector": "ADJACENT", "baseScore": 7.3, "baseSeverity": "HIGH", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "LOW", "subConfidentialityImpact": "LOW", "subIntegrityImpact": "LOW", "userInteraction": "ACTIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:L/SC:L/SI:L/SA:L", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] }, { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-08T10:02:36.723Z", "orgId": "cf45122d-9d50-442a-9b23-e05cde9943d8", "shortName": "Milestone" }, "references": [ { "url": "https://supportcommunity.milestonesys.com/KBRedir?art=000065801\u0026lang=en_US" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eTo mitigate the issue, we highly recommend installing the XProtect Device Pack version 13.2a or later which contains the most up to date device drivers.\u003c/span\u003e\u003cbr\u003e" } ], "value": "To mitigate the issue, we highly recommend installing the XProtect Device Pack version 13.2a or later which contains the most up to date device drivers." } ], "source": { "discovery": "EXTERNAL" }, "title": "Camera Driver possible Buffer Overflow", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "If, for any reason, patching is not possible, you should proceed with caution when adding new cameras and \nscan only IPs which are confirmed to be valid and trusted devices.\n\n\u003cbr\u003e" } ], "value": "If, for any reason, patching is not possible, you should proceed with caution when adding new cameras and \nscan only IPs which are confirmed to be valid and trusted devices." } ], "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "cf45122d-9d50-442a-9b23-e05cde9943d8", "assignerShortName": "Milestone", "cveId": "CVE-2024-3506", "datePublished": "2024-10-08T10:00:38.099Z", "dateReserved": "2024-04-09T07:18:37.878Z", "dateUpdated": "2024-10-08T13:50:58.073Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-12569
Vulnerability from cvelistv5
Published
2024-12-19 08:41
Modified
2024-12-20 17:58
Severity ?
EPSS score ?
Summary
Disclosure of sensitive information in HikVision camera driver's log file in XProtect Device Pack allows an attacker to read camera credentials stored in the Recording Server under specific conditions.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Milestone Systems | XProtect VMS |
Version: 0 < 13.5a |
|
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-12569", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-20T17:58:06.597166Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-20T17:58:57.752Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "Device Pack", "platforms": [ "Windows" ], "product": "XProtect VMS", "vendor": "Milestone Systems", "versions": [ { "lessThan": "13.5a", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Disclosure of sensitive information in HikVision camera driver\u0027s log file in XProtect Device Pack allows an attacker to read camera credentials stored in the Recording Server under specific conditions.\u003cbr\u003e" } ], "value": "Disclosure of sensitive information in HikVision camera driver\u0027s log file in XProtect Device Pack allows an attacker to read camera credentials stored in the Recording Server under specific conditions." } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "LOCAL", "baseScore": 5.2, "baseSeverity": "MEDIUM", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532: Insertion of Sensitive Information into Log File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-19T08:41:33.342Z", "orgId": "cf45122d-9d50-442a-9b23-e05cde9943d8", "shortName": "Milestone" }, "references": [ { "url": "https://supportcommunity.milestonesys.com/KBRedir?art=000067740\u0026lang=en_US" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cdiv\u003e\u003cdiv\u003e\u003cp\u003eTo mitigate the issue, we highly recommend installing the latest XProtect Device Pack which contains the most up to date device drivers. \u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\n\n\u003cbr\u003e" } ], "value": "To mitigate the issue, we highly recommend installing the latest XProtect Device Pack which contains the most up to date device drivers." } ], "source": { "discovery": "UNKNOWN" }, "title": "Sensitive Information in Driver\u2019s Log File", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cdiv\u003e\u003cdiv\u003e\u003cp\u003eIf, for any reason, update is not possible, we recommend monitoring of the log files under \u2018%PROGRAMDATA%\\XProtect Recording Server\\Logs\\Drivers\u2019 for exposed credentials. \u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\n\n\u003cbr\u003e" } ], "value": "If, for any reason, update is not possible, we recommend monitoring of the log files under \u2018%PROGRAMDATA%\\XProtect Recording Server\\Logs\\Drivers\u2019 for exposed credentials." } ], "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "cf45122d-9d50-442a-9b23-e05cde9943d8", "assignerShortName": "Milestone", "cveId": "CVE-2024-12569", "datePublished": "2024-12-19T08:41:33.342Z", "dateReserved": "2024-12-12T10:59:50.462Z", "dateUpdated": "2024-12-20T17:58:57.752Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }