NCSC-2024-0273

Vulnerability from csaf_ncscnl - Published: 2024-07-02 07:04 - Updated: 2024-07-02 07:04
Summary
Kwetsbaarheden ontdekt in Kiloview P1 4G Video Encoder en P2 4G Video Encoder

Notes

The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions: NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein. NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory. This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Er zijn kwetsbaarheden ontdekt in Kiloview P1 en P2. Kiloview P1 en P2 zijn hardware-oplossingen om beeldinformatie in HDMI-formaat te kunnen streamen. De firmware van deze systemen bevat een aantal ernstige kwetsbaarheden, waardoor een kwaadwillende aanvallen kan uitvoeren die kunnen leiden tot de volgende categorieën schade: • Cross-Site-Scripting (XSS) • Omzeilen van authenticatie • Denial-of-Service (DoS) • Manipulatie van gegevens • (Remote) code execution (Administrator/Root rechten) • Toegang tot gevoelige gegevens
Interpretaties
De firmware maakt gebruik van een aantal hard-coded credentials, waardoor een kwaadwillende toegang kan krijgen tot het systeem. Ook is het mogelijk om zonder authenticatie de firmware te vervangen, waardoor de werking van het systeem kan worden gemanipuleerd. Er is geen encryptie op de configuratie webinterface waardoor een aanvaller de communicatie kan afluisteren en credentials kan onderscheppen. Elk van de kwetsbaarheden afzonderlijk maakt misbruik mogelijk. In keten echter, is totale overname van het systeem mogelijk, waarmee de kwaadwillende volledige controle heeft over het systeem en de streaming data.
Oplossingen
De leverancier heeft besloten de kwetsbaarheden niet te verhelpen in de meest recente update van de firmware. Bij navraag door het NCSC geeft de leverancier ook geen indicatie van een oplossingstermijn. Wel heeft de leverancier updates uitgebracht voor de centrale serversystemen om misbruik daar tegen te gaan. Het NCSC adviseert daarom dan ook om op basis van deze informatie een risico-afweging te maken omtrent de inzet en het gebruik van deze systemen.
Kans
medium
Schade
high
CWE-20
Improper Input Validation
CWE-305
Authentication Bypass by Primary Weakness
CWE-306
Missing Authentication for Critical Function
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CWE-494
Download of Code Without Integrity Check
CWE-521
Weak Password Requirements
CWE-522
Insufficiently Protected Credentials
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE-798
Use of Hard-coded Credentials

{
  "document": {
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE"
      }
    },
    "lang": "nl",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n    NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n    NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n    This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
      },
      {
        "category": "description",
        "text": "Er zijn kwetsbaarheden ontdekt in Kiloview P1 en P2.\n\nKiloview P1 en P2 zijn hardware-oplossingen om beeldinformatie in HDMI-formaat te kunnen streamen. De firmware van deze systemen bevat een aantal ernstige kwetsbaarheden, waardoor een kwaadwillende aanvallen kan uitvoeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\u2022\tCross-Site-Scripting (XSS)\n\u2022\tOmzeilen van authenticatie\n\u2022\tDenial-of-Service (DoS)\n\u2022\tManipulatie van gegevens\n\u2022\t(Remote) code execution (Administrator/Root rechten)\n\u2022\tToegang tot gevoelige gegevens",
        "title": "Feiten"
      },
      {
        "category": "description",
        "text": "De firmware maakt gebruik van een aantal hard-coded credentials, waardoor een kwaadwillende toegang kan krijgen tot het systeem.\n\nOok is het mogelijk om zonder authenticatie de firmware te vervangen, waardoor de werking van het systeem kan worden gemanipuleerd.\n\nEr is geen encryptie op de configuratie webinterface waardoor een aanvaller de communicatie kan afluisteren en credentials kan onderscheppen.\n\nElk van de kwetsbaarheden afzonderlijk maakt misbruik mogelijk. In keten echter, is totale overname van het systeem mogelijk, waarmee de kwaadwillende volledige controle heeft over het systeem en de streaming data.",
        "title": "Interpretaties"
      },
      {
        "category": "description",
        "text": "De leverancier heeft besloten de kwetsbaarheden niet te verhelpen in de meest recente update van de firmware. Bij navraag door het NCSC geeft de leverancier ook geen indicatie van een oplossingstermijn. Wel heeft de leverancier updates uitgebracht voor de centrale serversystemen om misbruik daar tegen te gaan.\n\nHet NCSC adviseert daarom dan ook om op basis van deze informatie een risico-afweging te maken omtrent de inzet en het gebruik van deze systemen.",
        "title": "Oplossingen"
      },
      {
        "category": "general",
        "text": "medium",
        "title": "Kans"
      },
      {
        "category": "general",
        "text": "high",
        "title": "Schade"
      },
      {
        "category": "general",
        "text": "Improper Input Validation",
        "title": "CWE-20"
      },
      {
        "category": "general",
        "text": "Authentication Bypass by Primary Weakness",
        "title": "CWE-305"
      },
      {
        "category": "general",
        "text": "Missing Authentication for Critical Function",
        "title": "CWE-306"
      },
      {
        "category": "general",
        "text": "Use of a Broken or Risky Cryptographic Algorithm",
        "title": "CWE-327"
      },
      {
        "category": "general",
        "text": "Download of Code Without Integrity Check",
        "title": "CWE-494"
      },
      {
        "category": "general",
        "text": "Weak Password Requirements",
        "title": "CWE-521"
      },
      {
        "category": "general",
        "text": "Insufficiently Protected Credentials",
        "title": "CWE-522"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
        "title": "CWE-79"
      },
      {
        "category": "general",
        "text": "Use of Hard-coded Credentials",
        "title": "CWE-798"
      }
    ],
    "publisher": {
      "category": "coordinator",
      "contact_details": "cert@ncsc.nl",
      "name": "Nationaal Cyber Security Centrum",
      "namespace": "https://www.ncsc.nl/"
    },
    "references": [
      {
        "category": "external",
        "summary": "Reference - ncscclear",
        "url": "https://advisories.ncsc.nl/advisory?id=NCSC-2024-0273"
      }
    ],
    "title": "Kwetsbaarheden ontdekt in Kiloview P1 4G Video Encoder en P2 4G Video Encoder",
    "tracking": {
      "current_release_date": "2024-07-02T07:04:39.395441Z",
      "id": "NCSC-2024-0273",
      "initial_release_date": "2024-07-02T07:04:39.395441Z",
      "revision_history": [
        {
          "date": "2024-07-02T07:04:39.395441Z",
          "number": "0",
          "summary": "Initiele versie"
        }
      ],
      "status": "final",
      "version": "1.0.0"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "p1",
            "product": {
              "name": "p1",
              "product_id": "CSAFPID-1491694",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:kiloview:p1:4.8.2605:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "p2",
            "product": {
              "name": "p2",
              "product_id": "CSAFPID-1491719",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:kiloview:p2:4.8.2605:*:*:*:*:*:*:*"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "kiloview"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-41917",
      "product_status": {
        "known_affected": [
          "CSAFPID-1491694",
          "CSAFPID-1491719"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-41917",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-41917.json"
        }
      ],
      "title": "CVE-2023-41917"
    },
    {
      "cve": "CVE-2023-41918",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-41918",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-41918.json"
        }
      ],
      "title": "CVE-2023-41918"
    },
    {
      "cve": "CVE-2023-41919",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-41919",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-41919.json"
        }
      ],
      "title": "CVE-2023-41919"
    },
    {
      "cve": "CVE-2023-41920",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-41920",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-41920.json"
        }
      ],
      "title": "CVE-2023-41920"
    },
    {
      "cve": "CVE-2023-41921",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-41921",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-41921.json"
        }
      ],
      "title": "CVE-2023-41921"
    },
    {
      "cve": "CVE-2023-41922",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-41922",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-41922.json"
        }
      ],
      "title": "CVE-2023-41922"
    },
    {
      "cve": "CVE-2023-41923",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-41923",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-41923.json"
        }
      ],
      "title": "CVE-2023-41923"
    },
    {
      "cve": "CVE-2023-41926",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-41926",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-41926.json"
        }
      ],
      "title": "CVE-2023-41926"
    },
    {
      "cve": "CVE-2023-41927",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-41927",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-41927.json"
        }
      ],
      "title": "CVE-2023-41927"
    },
    {
      "cve": "CVE-2023-41928",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-41928",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-41928.json"
        }
      ],
      "title": "CVE-2023-41928"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…