{"vuid":"VU#923388","idnumber":"923388","name":"Swann SRNVW-470 allows unauthorized access to video stream and contains a hard-coded password","keywords":["dvr","camera","hard-coded password","CWE-259","authentication","CWE-288"],"overview":"Swann network video recorder (NVR) devices contain a hard-coded password and do not require authentication to view the video feed when accessing from specific URLs.","clean_desc":"CWE-259: Use of Hard-coded Password - CVE-2015-8286 According to the researcher, the Swann SRNVW-470LCD and Swann SWNVW-470CAM contain a hard-coded passwords allowing administrative or root access. Other models may also be affected. Current evidence suggests that the source of the hard-coded passwords in these models is CVE-2015-8286. The CERT/CC has published VU#899080 regarding CVE-2015-8286. However, the CERT/CC has not been able to confirm this with Swann. CWE-288: Authentication Bypass Using an Alternate Path or Channel - CVE-2015-8287 According to the researcher, a remote attacker with knowledge of the correct URL may be able to stream the live video feed from an IP camera connected to the NVR. This URL does not authenticate users before displaying the video feed.","impact":"A remote unauthenticated attacker may be able to gain root access to the device, or view the live video feed.","resolution":"The CERT/CC is currently unaware of a full solution to these issues. Swann has stated that the hard-coded password issue has been addressed in firmware v2.6.0.1 of older DVR devices, firmware v0114 for the NVW-470LCD, and firmware v1022 for the NVW-470CAM. Updated firmware can be obtained from the Swann support portal. However, the researcher disputes this update and has stated that the new NVW-470 firmware does not appear to address the issue. Swann has currently not replied to further inquiries regarding this dispute from the CERT/CC. You may also consider the following mitigation:","workarounds":"Restrict network access Use a firewall or similar technology to restrict access to trusted hosts, networks, and services.","sysaffected":"","thanks":"Thanks to Junia Valente of the \nCyber-Physical Systems Security Lab at UT Dallas\n for reporting this vulnerability.","author":"This document was written by Garret Wassermann.","public":["h","t","t","p",":","/","/","w","w","w",".","s","w","a","n","n",".","c","o","m","/","u","s","/","s","w","n","v","w","-","4","7","0","k","i","t"],"cveids":["CVE-2015-8286","CVE-2015-8287"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2015-08-04T11:58:08Z","publicdate":"2016-02-17T00:00:00Z","datefirstpublished":"2016-02-17T21:09:58Z","dateupdated":"2016-02-17T21:38:13Z","revision":60,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"C","cvss_integrityimpact":"C","cvss_availabilityimpact":"C","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"10","cvss_basevector":"AV:N/AC:L/Au:N/C:C/I:C/A:C","cvss_temporalscore":"8.3","cvss_environmentalscore":"6.19533741456","cvss_environmentalvector":"CDP:ND/TD:M/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}