Dahua Security Cameras Stack-based Buffer Overflow (CVE-2017-3223)

critical Tenable OT Security Plugin ID 502326

Synopsis

The remote OT asset is affected by a vulnerability.

Description

Dahua IP camera products using firmware versions prior to V2.400.0000.14.R.20170713 include a version of the Sonia web interface that may be vulnerable to a stack buffer overflow. Dahua IP camera products include an application known as Sonia (/usr/bin/sonia) that provides the web interface and other services for controlling the IP camera remotely. Versions of Sonia included in firmware versions prior to DH_IPC-Consumer-Zi-Themis_Eng_P_V2.408.0000.11.R.20170621 do not validate input data length for the 'password' field of the web interface. A remote, unauthenticated attacker may submit a crafted POST request to the IP camera's Sonia web interface that may lead to out-of-bounds memory operations and loss of availability or remote code execution. The issue was originally identified by the researcher in firmware version DH_IPC- HX1X2X-Themis_EngSpnFrn_N_V2.400.0000.30.R.20160803.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

Refer to the vendor advisory.

See Also

https://www.dahuasecurity.com/aboutUs/trustedCenter/details/402

http://www.securityfocus.com/bid/99620

https://www.kb.cert.org/vuls/id/547255

Plugin Details

Severity: Critical

ID: 502326

Version: 1.2

Type: remote

Family: Tenable.ot

Published: 7/29/2024

Updated: 7/30/2024

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2017-3223

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:dahuasecurity:dh-ipc-a15_firmware, cpe:/o:dahuasecurity:dh-ipc-c35_firmware, cpe:/o:dahuasecurity:dh-ipc-hfw1120s-w_firmware, cpe:/o:dahuasecurity:dh-ipc-k35a_firmware, cpe:/o:dahuasecurity:dh-ipc-hfw11a0sn-w_firmware, cpe:/o:dahuasecurity:dh-ipc-hdbw11a0en-w_firmware, cpe:/o:dahuasecurity:dh-ipc-hfw13a0sn-w_firmware, cpe:/o:dahuasecurity:dh-ipc-hdbw1120e-w_firmware, cpe:/o:dahuasecurity:dh-ipc-a35_firmware, cpe:/o:dahuasecurity:dh-ipc-c15_firmware, cpe:/o:dahuasecurity:dh-ipc-hdbw1320e-w_firmware, cpe:/o:dahuasecurity:dh-ipc-hfw1320s-w_firmware, cpe:/o:dahuasecurity:dh-ipc-k15_firmware, cpe:/o:dahuasecurity:dh-ipc-k15a_firmware, cpe:/o:dahuasecurity:dh-ipc-k35_firmware, cpe:/o:dahuasecurity:dh-ipc-hdbw13a0en-w_firmware

Required KB Items: Tenable.ot/DahuaSecurity

Exploit Ease: No known exploits are available

Patch Publication Date: 7/24/2018

Vulnerability Publication Date: 7/24/2018

Reference Information

CVE: CVE-2017-3223

CWE: 121