ID

VAR-201907-1078


CVE

CVE-2017-8226


TITLE

Amcrest IPM-721S Vulnerabilities related to the use of hard-coded credentials on devices

Trust: 0.8

sources: JVNDB: JVNDB-2017-014564

DESCRIPTION

Amcrest IPM-721S V2.420.AC00.16.R.20160909 devices have default credentials that are hardcoded in the firmware and can be extracted by anyone who reverses the firmware to identify them. If the firmware version V2.420.AC00.16.R 9/9/2016 is dissected using binwalk tool, one obtains a _user-x.squashfs.img.extracted archive which contains the filesystem set up on the device that many of the binaries in the /usr folder. The binary "sonia" is the one that has the vulnerable function that sets up the default credentials on the device. If one opens this binary in IDA-pro, one will notice that this follows a ARM little endian format. The function sub_3DB2FC in IDA pro is identified to be setting up the values at address 0x003DB5A6. The sub_5C057C then sets this value and adds it to the Configuration files in /mnt/mtd/Config/Account1 file. Amcrest IPM-721S The device contains a vulnerability related to the use of hard-coded credentials.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Amcrest IPM-721S is a wireless IP camera from Amcrest. An authorization issue vulnerability exists in the AmcrestIPM-721SV2.420.AC00.16.R.20160909 release. The vulnerability stems from a lack of authentication in the network system or product or insufficient strength of authentication. No detailed vulnerability details are currently available. There is a trust management vulnerability in Amcrest IPM-721S V2.420.AC00.16.R.20160909. Attackers can use default passwords or hard-coded passwords, hard-coded certificates, etc. to attack affected components

Trust: 2.34

sources: NVD: CVE-2017-8226 // JVNDB: JVNDB-2017-014564 // CNVD: CNVD-2019-24192 // VULHUB: VHN-116429 // VULMON: CVE-2017-8226

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-24192

AFFECTED PRODUCTS

vendor:amcrestmodel:ipm-721sscope:lteversion:2.420.ac00.16.r.20160909

Trust: 1.0

vendor:amcrestmodel:ipm-721sscope:eqversion:2.420.ac00.16.r.20160909

Trust: 0.8

vendor:amcrestmodel:ipm-721s v2.420.ac00.16.r.20160909scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2019-24192 // JVNDB: JVNDB-2017-014564 // NVD: CVE-2017-8226

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-8226
value: CRITICAL

Trust: 1.0

NVD: CVE-2017-8226
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2019-24192
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201907-195
value: CRITICAL

Trust: 0.6

VULHUB: VHN-116429
value: HIGH

Trust: 0.1

VULMON: CVE-2017-8226
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-8226
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2019-24192
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-116429
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-8226
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2019-24192 // VULHUB: VHN-116429 // VULMON: CVE-2017-8226 // JVNDB: JVNDB-2017-014564 // CNNVD: CNNVD-201907-195 // NVD: CVE-2017-8226

PROBLEMTYPE DATA

problemtype:CWE-798

Trust: 1.9

sources: VULHUB: VHN-116429 // JVNDB: JVNDB-2017-014564 // NVD: CVE-2017-8226

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201907-195

TYPE

trust management problem

Trust: 0.6

sources: CNNVD: CNNVD-201907-195

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-014564

PATCH

title:Top Pageurl:https://amcrest.com/

Trust: 0.8

title:Patch for AmcrestIPM-721S Authorization Issue Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/170539

Trust: 0.6

title:Amcrest IPM-721S Remediation measures for authorization problem vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=94390

Trust: 0.6

title:IoT_vulnerabilitiesurl:https://github.com/ethanhunnt/IoT_vulnerabilities

Trust: 0.1

sources: CNVD: CNVD-2019-24192 // VULMON: CVE-2017-8226 // JVNDB: JVNDB-2017-014564 // CNNVD: CNNVD-201907-195

EXTERNAL IDS

db:NVDid:CVE-2017-8226

Trust: 3.3

db:PACKETSTORMid:153224

Trust: 1.9

db:JVNDBid:JVNDB-2017-014564

Trust: 0.8

db:CNNVDid:CNNVD-201907-195

Trust: 0.7

db:CNVDid:CNVD-2019-24192

Trust: 0.6

db:VULHUBid:VHN-116429

Trust: 0.1

db:VULMONid:CVE-2017-8226

Trust: 0.1

sources: CNVD: CNVD-2019-24192 // VULHUB: VHN-116429 // VULMON: CVE-2017-8226 // JVNDB: JVNDB-2017-014564 // PACKETSTORM: 153224 // CNNVD: CNNVD-201907-195 // NVD: CVE-2017-8226

REFERENCES

url:https://github.com/ethanhunnt/iot_vulnerabilities/blob/master/amcrest_sec_issues.pdf

Trust: 2.6

url:https://nvd.nist.gov/vuln/detail/cve-2017-8226

Trust: 2.1

url:https://seclists.org/bugtraq/2019/jun/8

Trust: 1.8

url:http://packetstormsecurity.com/files/153224/amcrest-ipm-721s-credential-disclosure-privilege-escalation.html

Trust: 1.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-8226

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/798.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/ethanhunnt/iot_vulnerabilities

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-8229

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-8227

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-8228

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13719

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-8230

Trust: 0.1

sources: CNVD: CNVD-2019-24192 // VULHUB: VHN-116429 // VULMON: CVE-2017-8226 // JVNDB: JVNDB-2017-014564 // PACKETSTORM: 153224 // CNNVD: CNNVD-201907-195 // NVD: CVE-2017-8226

CREDITS

Mandar Satam

Trust: 0.1

sources: PACKETSTORM: 153224

SOURCES

db:CNVDid:CNVD-2019-24192
db:VULHUBid:VHN-116429
db:VULMONid:CVE-2017-8226
db:JVNDBid:JVNDB-2017-014564
db:PACKETSTORMid:153224
db:CNNVDid:CNNVD-201907-195
db:NVDid:CVE-2017-8226

LAST UPDATE DATE

2024-11-23T21:59:49.499000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-24192date:2019-07-24T00:00:00
db:VULHUBid:VHN-116429date:2019-07-11T00:00:00
db:VULMONid:CVE-2017-8226date:2019-07-11T00:00:00
db:JVNDBid:JVNDB-2017-014564date:2019-07-12T00:00:00
db:CNNVDid:CNNVD-201907-195date:2019-08-02T00:00:00
db:NVDid:CVE-2017-8226date:2024-11-21T03:33:34.810

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-24192date:2019-07-22T00:00:00
db:VULHUBid:VHN-116429date:2019-07-03T00:00:00
db:VULMONid:CVE-2017-8226date:2019-07-03T00:00:00
db:JVNDBid:JVNDB-2017-014564date:2019-07-12T00:00:00
db:PACKETSTORMid:153224date:2019-06-07T15:06:02
db:CNNVDid:CNNVD-201907-195date:2019-07-03T00:00:00
db:NVDid:CVE-2017-8226date:2019-07-03T20:15:10.430