SOYAL Biometric Access Control System 5.0 Weak Default Credentials
Title: SOYAL Biometric Access Control System 5.0 Weak Default Credentials
Advisory ID: ZSL-2021-5631
Type: Local/Remote
Impact: System Access
Risk: (4/5)
Release Date: 18.03.2021
AR837E/EF - F/W: 4.3
AR725Ev2 - F/W: 4.3 191231
AR331/725E - F/W: 4.2
AR837E/EF - F/W: 4.1
AR-727CM /i - F/W: 4.09
AR-727CM /i - F/W: 4.06
AR-837E - F/W: 3.03
SOYAL Serial Device Server 4.03A
SOYAL Serial Device Server 4.01n
SOYAL Serial Device Server 3.07n
[03.02.2021] Vendor contacted.
[08.02.2021] No response from the vendor.
[09.02.2021] Distributor responds and informs vendor.
[09.02.2021] Sent details to distributor.
[10.02.2021] Asked distributor for status update.
[11.02.2021] Vendor will patch the issue.
[18.03.2021] Public security advisory released.
[2] https://packetstormsecurity.com/files/161875/
[3] https://cxsecurity.com/issue/WLB-2021030119
[4] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28266
[5] https://nvd.nist.gov/vuln/detail/CVE-2021-28266
[23.03.2021] - Added reference [1], [2] and [3]
[19.06.2021] - Added reference [4] and [5]
Web: https://www.zeroscience.mk
e-mail: lab@zeroscience.mk
Advisory ID: ZSL-2021-5631
Type: Local/Remote
Impact: System Access
Risk: (4/5)
Release Date: 18.03.2021
Summary
Soyal Access systems are built into Raytel Door Entry Systems and are providing access and lift control to many buildings from public and private apartment blocks to prestigious public buildings.Description
The web control panel uses weak set of default administrative credentials (no password) that can be easily guessed in remote password attacks.Vendor
SOYAL Technology Co., Ltd - https://www.soyal.comAffected Version
AR-727 i/CM - F/W: 5.0AR837E/EF - F/W: 4.3
AR725Ev2 - F/W: 4.3 191231
AR331/725E - F/W: 4.2
AR837E/EF - F/W: 4.1
AR-727CM /i - F/W: 4.09
AR-727CM /i - F/W: 4.06
AR-837E - F/W: 3.03
Tested On
SOYAL Technology WebServer 2.0SOYAL Serial Device Server 4.03A
SOYAL Serial Device Server 4.01n
SOYAL Serial Device Server 3.07n
Vendor Status
[25.01.2021] Vulnerability discovered.[03.02.2021] Vendor contacted.
[08.02.2021] No response from the vendor.
[09.02.2021] Distributor responds and informs vendor.
[09.02.2021] Sent details to distributor.
[10.02.2021] Asked distributor for status update.
[11.02.2021] Vendor will patch the issue.
[18.03.2021] Public security advisory released.
PoC
soyal_creds.txtCredits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>References
[1] https://exchange.xforce.ibmcloud.com/vulnerabilities/198553[2] https://packetstormsecurity.com/files/161875/
[3] https://cxsecurity.com/issue/WLB-2021030119
[4] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28266
[5] https://nvd.nist.gov/vuln/detail/CVE-2021-28266
Changelog
[18.03.2021] - Initial release[23.03.2021] - Added reference [1], [2] and [3]
[19.06.2021] - Added reference [4] and [5]
Contact
Zero Science LabWeb: https://www.zeroscience.mk
e-mail: lab@zeroscience.mk