Overview
Multiple models of Harman AMX multimedia devices contain a hard-coded debug account.
Description
CWE-798: Use of Hard-coded Credentials - CVE-2015-8362 According to the researchers' blog post, several models of Harman AMX multimedia devices contain a hard-coded "backdoor" account with administrative permissions. Further details are available in the researchers' vulnerability advisory. AMX firmware release notes indicate this was a debugging account left in the released firmware.
Affected devices include but are not limited to:
|
Impact
An attacker with knowledge of the account credentials can obtain administrative access on the device. |
Solution
Apply an updateAMX has released an update for some devices. Affected users are encouraged to contact Harman's support line for more information on obtaining the update. |
Restrict network access |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 10 | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Temporal | 7.8 | E:POC/RL:OF/RC:C |
Environmental | 5.9 | CDP:ND/TD:M/CR:ND/IR:ND/AR:ND |
References
- http://blog.sec-consult.com/2016/01/deliberately-hidden-backdoor-account-in.html
- http://www.amx.com/techcenter/NXSecurityBrief/
- http://www.amx.com/techcenter/firmware.asp?Category=Hot%20Fix%20Files
- http://seclists.org/fulldisclosure/2016/Jan/63
- https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20160121-0_AMX_Deliberately_hidden_backdoor_account_v10.txt
- http://www.amx.com/assets/whitePapers/AMX.AVIT.Administrators.Guide.pdf
Acknowledgements
Thanks to Johannes Greil of SEC Consult for reporting this vulnerability.
This document was written by Garret Wassermann.
Other Information
CVE IDs: | CVE-2015-8362 |
Date Public: | 2016-01-21 |
Date First Published: | 2016-01-21 |
Date Last Updated: | 2016-01-27 23:50 UTC |
Document Revision: | 41 |