exacqVision 9.8 Unquoted Service Path Privilege Escalation
Title: exacqVision 9.8 Unquoted Service Path Privilege Escalation
Advisory ID: ZSL-2019-5515
Type: Local
Impact: Privilege Escalation
Risk: (2/5)
Release Date: 18.03.2019
[2] https://cxsecurity.com/issue/WLB-2019030189
[3] https://www.johnsoncontrols.com/-/media/jci/cyber-solutions/product-security-advisories/2019/jcipsa201903-v21-exacqvision-server.pdf
[4] https://www.us-cert.gov/ics/advisories/icsa-19-199-01
[5] https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-7590
[6] https://nvd.nist.gov/vuln/detail/CVE-2019-7590
[7] https://www.securityfocus.com/bid/109307
[27.03.2019] - Added reference [1] and [2]
[24.07.2019] - Added vendor status and reference [3], [4], [5], [6] and [7]
Web: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk
Advisory ID: ZSL-2019-5515
Type: Local
Impact: Privilege Escalation
Risk: (2/5)
Release Date: 18.03.2019
Summary
The exacqVision VMS (Video Management System) software records surveillance video from thousands of IP camera models and displays on a free Windows, Linux or OSX client software, web browser or mobile device.Description
The application suffers from an unquoted search path issue impacting the services 'exacqVisionServer', 'dvrdhcpserver' and 'mdnsresponder' for Windows deployed as part of exacqVision software application. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with elevated privileges on the system. A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.Vendor
Exacq Technologies, Inc. - https://www.exacq.comAffected Version
9.8.4.150001Tested On
Microsoft Windows 7 Professional SP1 (EN)Vendor Status
[18.07.2019] Vendor releases version 19.03 to address this issue.PoC
exacqvision_eop.txtCredits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>References
[1] https://packetstormsecurity.com/files/152128[2] https://cxsecurity.com/issue/WLB-2019030189
[3] https://www.johnsoncontrols.com/-/media/jci/cyber-solutions/product-security-advisories/2019/jcipsa201903-v21-exacqvision-server.pdf
[4] https://www.us-cert.gov/ics/advisories/icsa-19-199-01
[5] https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-7590
[6] https://nvd.nist.gov/vuln/detail/CVE-2019-7590
[7] https://www.securityfocus.com/bid/109307
Changelog
[18.03.2019] - Initial release[27.03.2019] - Added reference [1] and [2]
[24.07.2019] - Added vendor status and reference [3], [4], [5], [6] and [7]
Contact
Zero Science LabWeb: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk