Vulnerabilities

Sony Patches Remotely Exploitable Vulnerabilities in Network Cameras

Two serious, remotely exploitable vulnerabilities in Sony IPELA E Series Network Camera products could allow attackers to execute commands or arbitrary code on affected devices. 

<p><span><span><strong>Two serious, remotely exploitable vulnerabilities in Sony IPELA E Series Network Camera products could allow attackers to execute commands or arbitrary code on affected devices. </strong></span></span></p>

Two serious, remotely exploitable vulnerabilities in Sony IPELA E Series Network Camera products could allow attackers to execute commands or arbitrary code on affected devices. 

Tracked as CVE-2018-3937, the first of the vulnerabilities is a command injection flaw in the measurementBitrateExec functionality of the IPELA E Series Network Camera. These are network facing devices used for monitoring and surveillance.

The issue was discovered by Cory Duplantis and Claudio Bozzato of Cisco Talos, who explain that arbitrary commands could be executed via a specially crafted GET request. An attacker looking to trigger the vulnerability could simply send an HTTP request for that.

“While parsing the input measurement string, there isn’t a check on the server address (-c). In this manner, any string can be placed as the server address and will be executed via system. Knowing this, an attacker can execute arbitrary commands in the position of the server address,” the researchers explain. 

The second vulnerability is tracked as CVE-2018-3938 and affects the 802dot1xclientcert.cgi functionality of IPELA E Series Camera devices.

“A specially crafted POST can cause a stack-based buffer overflow, resulting in remote code execution. An attacker can send a malicious POST request to trigger this vulnerability,” Cisco says. 

The 802dot1xclientcert.cgi endpoint, the security researchers explain, is “designed to handle everything related to certificate management for 802.1x.”

When data is received, certain checks are performed and the data is then directly copied to a local buffer via memcpy. However, because the strlen length is not checked against a safe value, a stack-based buffer overflow occurs and an attacker can abuse it to remotely execute commands on the device.

Advertisement. Scroll to continue reading.

Both vulnerabilities were reported to Sony last month. Featuring a CVSS score of 9.1, both of these issue were found in Sony IPELA E series G5 firmware 1.87.00. Sony released an update last week to address the security bugs.

Related: Critical Flaws Expose 400 Axis Cameras to Remote Attacks

Related: Remotely Exploitable Flaws Found in SmartCam Cameras

Related Content

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version