what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Servision HVG Hardcoded Credentials

Servision HVG Hardcoded Credentials
Posted Feb 11, 2016
Authored by Richard Tafoya

Servision HVG with firmware below version 2.2.26a100 suffers from a hard-coded backdoor password vulnerability.

tags | exploit
SHA-256 | 6d99c0ab96d627084eb77a8ada62536fc9cdfb024d00cd992c46f7b2be77198f

Servision HVG Hardcoded Credentials

Change Mirror Download
Hello...

Over a year ago I disclosed several vulnerabilities in Servision HVG network video recording devices. CVE-2015-0929 and CVE-2015-0930.
https://www.kb.cert.org/vuls/id/522460

Since it's been a while now, and hardcoded backdoor passwords in "security" devices are the current hotness...

Hardcoded Backdoor Password: A hardcoded backdoor password has been discovered in SerVision HVG firmware below version 2.2.26a100.
An unauthenticated user may visit the servision Web GUI Login (http://<Servision_IP>:port/) and utilize the password "Bantham" (without the quotes) with a blank username (or any username) to log into the Web GUI with "admin" like rights. This user account can then perform actions such as deleting all of the recorded video or making a settings change that would essentially tell the device to wait up to 11 days after startup to turn on the network interface (effective DoS for video recording), additionally you can view the user list and their passwords in cleartext (view source on the user list page.)
How it was discovered: The firmware tvx file was viewed via a hex editor and all hex characters were converted to ASCII. All 5-10 character ASCII strings from the firmware file were pulled out and used in a password brute force attack against the usernames “Administrator, Admin, and root” on the servision test device. This password worked on all three accounts, even though the “admin” account had a different password set and the other two users did not even exist on the device. I attempted to login with this password and a blank username and that also allowed access into the device.
How to find servisions on the internet:
Default http Port = 10000 or 9988
The "Server:" header in an HTTP GET response from the device will have a value similar to the below examples.
Examples:
Server:2.2.23a65/8848(2.1) Server:2.2.23a65/8848(2.2) Server:2.2.23a65/8847(2.1) Server:2.2.23a65/8847(2.2)



Regards,
Rich


Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close