Vulnerabilities discovered by IBM security researchers in five different visitor management systems could be abused for data exfiltration or for access to the underlying machines.
The analyzed systems include Lobby Track Desktop (Jolly Technologies), EasyLobby Solo (HID Global), eVisitorPass (Threshold Security), Envoy Passport (Envoy), and The Receptionist (The Receptionist).
A total of 19 vulnerabilities were discovered in these systems, and their successful exploitation could lead to exfiltration of data such as visitor logs, contact information, or corporate activities; complete takeover of the application; or break out of the kiosk environment to interact with Windows.
Based on the systems’ features and the deployment context, the attacker could perform a variety of illicit operations, including gaining physical access to an environment by acquiring a valid badge (some systems can issue and provision radio frequency identification (RFID) badges).
“Even if the issued badges are not capable of opening doors, they may still identify an attacker as a trusted outsider. A smile and gentle request for help opening a locked door often goes unchallenged with a valid badge,” IBM notes.
With the visitor management system capable of accessing the internal network, an attacker may simply attempt to compromise the network to gain foothold into the environment.
Provided that network access isn’t available and the visitor management system can’t issue badges, the attacker could still abuse the discovered vulnerabilities to access and exfiltrate data about the visitors. Depending on the stored data, identity theft could also be possible.
The security researchers discovered seven vulnerabilities in the Lobby Track Desktop, namely information disclosure (CVE-2018-17482, CVE-2018-17483, and CVE-2018-17484), default account (CVE-2018-17485), visitor records security bypass (CVE-2018-17486), and kiosk breakout privilege escalation (CVE-2018-17487 and CVE-2018-17488).
EasyLobby Solo, the researchers say, is impacted by four security vulnerabilities, namely information disclosure (CVE-2018-17489), denial of service (CVE-2018-17490), privilege escalation (CVE-2018-17491), and default account (CVE-2018-17492).
Five of the discovered vulnerabilities impact eVisitorPass. Four of them are privilege escalation bugs (CVE-2018-17493, CVE-2018-17494, CVE-2018-17495, and CVE-2018-17496), while the last one is a default admin account (CVE-2018-17497).
The researchers found two vulnerabilities in Envoy Passport (affecting both the Android and iOS applications), both of which are information disclosure bugs (CVE-2018-17499 and CVE-2018-17500). A single flaw was discovered in The Receptionist, also an information disclosure issue (CVE-2018-17502).
Information on these vulnerabilities was provided to the vendors prior to publication, and patches have been already released, IBM says. Users of these visitor management systems are advised to apply the available patches as soon as possible, revoke admin privileges when they are not needed, use full-disk encryption, and use strong passwords.