Vocran NVR Remote Command Execution

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The Vocran network video recorder is affected by a remote command
execution vulnerability.

Description :

The remote Vocran network video recorder is affected by a remote
command execution vulnerability due to improper sanitization of
user-supplied input passed via /board.cgi. An unauthenticated
remote attacker can exploit this, via a specially crafted URL, to
execute arbitrary commands on the device.

This vulnerability has been used by the IoT Reaper botnet.

Note that Nessus has detected this vulnerability by reading the
contents of the file /proc/cpuinfo.

See also :

https://blogs.securiteam.com/index.php/archives/3445
http://www.nessus.org/u?197042fe

Solution :

At time of publication, Vacron had not yet released a patch. Users
should take precautions to ensure affected devices are not exposed
to the internet and that the devices are properly isolated on the
local network.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 9.5
(CVSS2#E:F/RL:U/RC:ND)
Public Exploit Available : true

Family: CGI abuses

Nessus Plugin ID: 104124 ()

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now