What is the Attack?
There are numerous active attacks on Camera Systems. The following are the significant ones:
CVE-2018-15745: A directory traversal vulnerability in Argus Surveillance DVR caused by an improper validation of user supplied data when the vulnerable application handles a maliciously crafted request. An attacker can exploit this to gain access to sensitive information in the context of the vulnerable application via a crafted request.
CVE-2018-10661 and CVE-2018-10662: An authentication bypass vulnerability in Axis Communications security cameras caused by an error in the application when handling a maliciously crafted HTTP request. A remote attacker may be able to exploit this to bypass authentication and obtain administrative access.
CVE-2016-20016: A command injection vulnerability in multiple MVPower CCTV DVR models caused by insufficient validation of user supplied inputs when processing HTTP requests. It may allow remote attackers to execute arbitrary system commands within the context of the application.
Unassigned CVE: A command injection vulnerability in VACRON Network Video Recorder devices caused by insufficient sanitizing of user supplied inputs in the application when parsing HTTP requests. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application, via a crafted HTTP request. CVE number has not been assigned to this vulnerability.
Why is this Significant?
FortiGuard Labs has observed active exploitation of the vulnerabilities in those camera systems, which result in system compromise, arbitrary system commands execution or file disclosure.
What is the Vendor Solution?
FortiGuard Labs is aware of patch availability only for CVE-2018-10661 and CVE-2018-10662.
What FortiGuard Coverage is Available?
Fortinet customers are protected via FortiGuard IPS – refer to the Outbreak Alert for “Multiple Vendor Camera System Attack” for the full FortiGuard coverage details.