<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>CVE-2023-6260 on SRA Labs</title>
    <link>https://labs.sra.io/tags/cve-2023-6260/</link>
    <description>Recent content in CVE-2023-6260 on SRA Labs</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-us</language>
    <lastBuildDate>Mon, 19 Feb 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://labs.sra.io/tags/cve-2023-6260/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Brivo Access Control Systems</title>
      <link>https://labs.sra.io/posts/brivoacs/</link>
      <pubDate>Mon, 19 Feb 2024 12:00:00 +0000</pubDate>
      
      <guid>https://labs.sra.io/posts/brivoacs/</guid>
      <description>&lt;h1 id=&#34;summary&#34;&gt;Summary&lt;/h1&gt;
&lt;p&gt;SRA has identified multiple vulnerabilities in Brivo Access Control Systems that can lead to the disclosure of sensitive system data and allow degradation or bypass of critical system functions.&lt;/p&gt;
&lt;h1 id=&#34;cve-identifiers&#34;&gt;CVE Identifiers&lt;/h1&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;CVE ID&lt;/th&gt;
          &lt;th&gt;CVE Name&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;CVE-2023-6259&lt;/td&gt;
          &lt;td&gt;Local Access to Sensitive Data&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;CVE-2023-6260&lt;/td&gt;
          &lt;td&gt;Web UI OS Command Injection&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h1 id=&#34;vulnerability-details--description&#34;&gt;Vulnerability Details / Description&lt;/h1&gt;
&lt;h2 id=&#34;cve-2023-6259--local-access-to-sensitive-data&#34;&gt;CVE-2023-6259 – Local Access to Sensitive Data&lt;/h2&gt;
&lt;p&gt;An attacker with physical access to the ACS100 or ACS300 devices can access sensitive data from device memory that can be used to conduct additional attacks.&lt;/p&gt;</description>
      <content>&lt;h1 id=&#34;summary&#34;&gt;Summary&lt;/h1&gt;
&lt;p&gt;SRA has identified multiple vulnerabilities in Brivo Access Control Systems that can lead to the disclosure of sensitive system data and allow degradation or bypass of critical system functions.&lt;/p&gt;
&lt;h1 id=&#34;cve-identifiers&#34;&gt;CVE Identifiers&lt;/h1&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;CVE ID&lt;/th&gt;
          &lt;th&gt;CVE Name&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;CVE-2023-6259&lt;/td&gt;
          &lt;td&gt;Local Access to Sensitive Data&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;CVE-2023-6260&lt;/td&gt;
          &lt;td&gt;Web UI OS Command Injection&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h1 id=&#34;vulnerability-details--description&#34;&gt;Vulnerability Details / Description&lt;/h1&gt;
&lt;h2 id=&#34;cve-2023-6259--local-access-to-sensitive-data&#34;&gt;CVE-2023-6259 – Local Access to Sensitive Data&lt;/h2&gt;
&lt;p&gt;An attacker with physical access to the ACS100 or ACS300 devices can access sensitive data from device memory that can be used to conduct additional attacks.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The CVSS severity level of this vulnerability has been calculated to be 7.1 (High)&lt;/p&gt;
&lt;p&gt;CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H&lt;/p&gt;
&lt;h2 id=&#34;cve-2023-6260--web-ui-os-command-injection&#34;&gt;CVE-2023-6260 – Web UI OS Command Injection&lt;/h2&gt;
&lt;h3 id=&#34;acs300-physical-access&#34;&gt;ACS300 (Physical Access)&lt;/h3&gt;
&lt;p&gt;An attacker with physical access to ACS300 devices can perform a command injection attack via the web UI and gain access to sensitive data that can be used to conduct additional attacks.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The CVSS base score of this vulnerability has been calculated to be 7.4 (High) for the physical access scenario:&lt;/p&gt;
&lt;p&gt;CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H&lt;/p&gt;
&lt;h3 id=&#34;acs100-adjacent-network-access&#34;&gt;ACS100 (Adjacent Network Access)&lt;/h3&gt;
&lt;p&gt;An attacker with local network access to ACS100 devices can perform a command injection attack via the web UI and gain access to sensitive data that can be used to conduct additional attacks.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The CVSS severity level of this vulnerability has been calculated to be 9.0 (High) for the adjacent network access scenario:&lt;/p&gt;
&lt;p&gt;CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H&lt;/p&gt;
&lt;h1 id=&#34;affected-versions-and-models&#34;&gt;Affected Versions and Models&lt;/h1&gt;
&lt;p&gt;Affects models ACS100, ACS300. Models ACS6000 and ACSSDC may also be affected.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Affects firmware versions from 5.2.4 but before 6.2.4.3. Versions prior to 5.2.4 may also be affected.&lt;/p&gt;
&lt;h1 id=&#34;mitre-cwe-weakness-enumeration&#34;&gt;MITRE CWE Weakness Enumeration&lt;/h1&gt;
&lt;p&gt;CWE-284: Improper Access Control&lt;/p&gt;
&lt;p&gt;CWE-522: Insufficiently Protected Credentials&lt;/p&gt;
&lt;p&gt;CWE-77: Improper Neutralization of Special Elements used in a Command (‘Command Injection’)&lt;/p&gt;
&lt;h1 id=&#34;remediation-options&#34;&gt;Remediation Options&lt;/h1&gt;
&lt;p&gt;Update affected devices to firmware version 6.2.4.3. Contact Brivo or your reseller for more information.&lt;/p&gt;
&lt;h1 id=&#34;source&#34;&gt;Source&lt;/h1&gt;
&lt;p&gt;These vulnerabilities were discovered by Alexandra Grochal and Gabe Siftar, as part of a research initiative for Security Risk Advisors’ internal hardware penetration testing team.&lt;/p&gt;
&lt;h1 id=&#34;timeframe&#34;&gt;Timeframe&lt;/h1&gt;
&lt;ul&gt;
&lt;li&gt;October 9, 2023 – SRA attempts initial contact with Brivo.&lt;/li&gt;
&lt;li&gt;November 9, 2023 – SRA shares vulnerability details with Brivo’s product security team.&lt;/li&gt;
&lt;li&gt;November 29, 2023 – SRA reserves CVE IDs.&lt;/li&gt;
&lt;li&gt;December 15, 2023 – Brivo releases fix to production.&lt;/li&gt;
&lt;/ul&gt;
</content>
    </item>
    
  </channel>
</rss>
