Teradek Cube 7.3.6 (snapshot.cgi) Stream Disclosure
Title: Teradek Cube 7.3.6 (snapshot.cgi) Stream Disclosure
Advisory ID: ZSL-2018-5463
Type: Local/Remote
Impact: Exposure of System Information, Exposure of Sensitive Information
Risk: (3/5)
Release Date: 21.05.2018
Hardware Version: 1.5
Teradek Firmware Version 7.3.15
[08.05.2018] Vendor contacted.
[08.05.2018] Vendor replied asking more details.
[08.05.2018] Sent details to the vendor.
[10.05.2018] Asked vendor for status update.
[13.05.2018] No response from the vendor.
[14.05.2018] Asked vendor for status update.
[20.05.2018] No response from the vendor.
[21.05.2018] Public security advisory released.
[2] https://packetstormsecurity.com/files/147791
[3] https://exchange.xforce.ibmcloud.com/vulnerabilities/143721
[29.05.2018] - Added reference [1], [2] and [3]
Web: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk
Advisory ID: ZSL-2018-5463
Type: Local/Remote
Impact: Exposure of System Information, Exposure of Sensitive Information
Risk: (3/5)
Release Date: 21.05.2018
Summary
Cube packs world-class video quality into a rugged, portable chassis for quick IP video deployments at any location. Each encoder and decoder includes HDMI and 3G-SDI I/O, Ethernet / WiFI connectivity, and full duplex IFB.Description
Cube suffers from an unauthenticated and unauthorized live stream disclosure when snapshot.cgi script is called.Vendor
Teradek, LLC - https://www.teradek.comAffected Version
Firmware Version: 7.3.6 (build 26850)Hardware Version: 1.5
Teradek Firmware Version 7.3.15
Tested On
lighttpd/1.4.31Vendor Status
[02.03.2018] Vulnerability discovered.[08.05.2018] Vendor contacted.
[08.05.2018] Vendor replied asking more details.
[08.05.2018] Sent details to the vendor.
[10.05.2018] Asked vendor for status update.
[13.05.2018] No response from the vendor.
[14.05.2018] Asked vendor for status update.
[20.05.2018] No response from the vendor.
[21.05.2018] Public security advisory released.
PoC
teradek_cube_stream.txtCredits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>References
[1] https://cxsecurity.com/issue/WLB-2018050172[2] https://packetstormsecurity.com/files/147791
[3] https://exchange.xforce.ibmcloud.com/vulnerabilities/143721
Changelog
[21.05.2018] - Initial release[29.05.2018] - Added reference [1], [2] and [3]
Contact
Zero Science LabWeb: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk