exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

AVer Information EH6108H+ Authentication Bypass / Inforation Exposure

AVer Information EH6108H+ Authentication Bypass / Inforation Exposure
Posted Sep 27, 2016
Authored by Travis Lee

AVer Information EH6108H+ hybrid DVR suffers from authentication bypass, hard-coded credential, and information exposure vulnerabilities.

tags | exploit, vulnerability, bypass, info disclosure
advisories | CVE-2016-6535, CVE-2016-6536, CVE-2016-6537
SHA-256 | 542457f732586cd30de78d97744a7ccf237f6d15e517b95167adadf9ca79f1d4

AVer Information EH6108H+ Authentication Bypass / Inforation Exposure

Change Mirror Download
Vulnerability Note VU#667480

AVer Information EH6108H+ hybrid DVR contains multiple vulnerabilities

https://www.kb.cert.org/vuls/id/667480





Overview:

AVer Information EH6108H+ hybrid DVR, version X9.03.24.00.07l and possibly
earlier, reportedly contains multiple vulnerabilities, including
undocumented privileged accounts, authentication bypass, and information
exposure.



Description:

AVer Information EH6108H+ hybrid DVR is an IP security camera management
system and streaming video recorder. Version X9.03.24.00.07l and possibly
earlier are reported to contain multiple vulnerabilities.



CWE-798: Use of Hard-coded Credentials - CVE-2016-6535



AVer Information EH6108H+ reportedly contains two undocumented, hard-coded
account credentials. Both accounts have root privileges and may be used to
gain access via an undocumented telnet service that cannot be disabled
through the web user interface and runs by default.



CWE-302: Authentication Bypass by Assumed-Immutable Data - CVE-2016-6536



By guessing the handle parameter of the /setup page of the web interface, an
unauthenticated attacker reportedly may be able to access restricted pages
and alter DVR configurations or change user passwords.



CWE-200: Information Exposure - CVE-2016-6537



User credentials are reported to be stored and transmitted in an insecure
manner. In the configuration page of the web interface, passwords are stored
in base64-encoded strings. In client requests, credentials are listed in
plain text in the cookie header.



For more information, refer to the researcher's disclosure.
(https://www.appsecconsulting.com/blog/easy-root-on-aver-eh6108h-hybrid-dvr-
and-more)



Impact:

A remote, unauthenticated attacker may be able to gain access with root
privileges to completely compromise vulnerable devices.



Solution:

The CERT/CC is currently unaware of a practical solution to this problem and
recommends the following workaround.

Restrict access



As a general good security practice, only allow connections from trusted
hosts and networks.



References:

http://surveillance.aver.com/model/embedded-hybrid-DVR-EH6108H-plus/

https://www.appsecconsulting.com/blog/easy-root-on-aver-eh6108h-hybrid-dvr-a
nd-more

https://cwe.mitre.org/data/definitions/798.html

https://cwe.mitre.org/data/definitions/302.html

https://cwe.mitre.org/data/definitions/200.html



Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close