exacqvision-web-service
CVE-2021-27664 is a critical vulnerability affecting the exacqVision Web Service, specifically versions 21.06.11.0 through 21.06.11.0. This flaw allows an unauthenticated remote user to gain access to credentials stored within the exacqVision server. The potential impact is significant, enabling unauthorized access and control of the surveillance system. A patch is available to address this vulnerability.
The core of this vulnerability lies in the improper handling of credentials within the exacqVision Web Service. An attacker, without requiring any authentication, can exploit this flaw to retrieve sensitive information, including usernames and passwords used by the system or its users. This stolen data can then be leveraged to gain unauthorized access to the exacqVision system itself, potentially allowing the attacker to view live camera feeds, access recorded video, and even modify system configurations. The blast radius extends beyond the immediate surveillance system; compromised credentials could be used for lateral movement within the network, impacting other connected systems and data. This vulnerability shares similarities with other credential leakage issues where weak access controls expose sensitive data to external threats.
CVE-2021-27664 was publicly disclosed on October 11, 2021. While no active exploitation campaigns have been definitively confirmed, the critical severity and ease of exploitation make it a high-priority target. The vulnerability is not currently listed on the CISA KEV catalog. Public proof-of-concept exploits are likely to emerge given the vulnerability's nature and severity.
Organizations utilizing exacqVision for video surveillance, particularly those with internet-facing deployments, are at significant risk. Systems with default configurations or weak password policies are especially vulnerable. Shared hosting environments where multiple customers share the same exacqVision instance also face increased exposure.
• windows / supply-chain: Monitor network traffic for attempts to access the exacqVision web service from unauthorized IP addresses. Examine Windows Event Logs for suspicious login attempts or credential access events.
Get-WinEvent -LogName Security -FilterXPath '//Event[System[Provider[@Name='Microsoft-Windows-Security-Auditing'] and EventID=4625]]'• linux / server: Monitor system logs (e.g., /var/log/auth.log) for failed login attempts or unusual activity related to the exacqVision service. Use lsof to identify processes accessing credential files.
lsof /path/to/exacqvision/credential/file• generic web: Monitor web server access logs for requests targeting the exacqVision web service from unusual IP addresses or user agents. Check response headers for any signs of credential leakage.
curl -I <exacqvision_url> | grep -i 'WWW-Authenticate'disclosure
patch
Status do Exploit
EPSS
0.27% (percentil 50%)
Vetor CVSS
The primary mitigation strategy is to immediately upgrade to a patched version of exacqVision Web Service as soon as it becomes available. Until the upgrade can be performed, several temporary workarounds can be implemented to reduce the risk. First, restrict network access to the exacqVision server, limiting exposure to external networks. Implement strong firewall rules to only allow necessary traffic. Review and audit stored credentials within the system, ensuring they adhere to strong password policies and are regularly rotated. Consider implementing multi-factor authentication (MFA) where possible to add an extra layer of security. After upgrading, confirm the vulnerability is resolved by attempting to access credentials via the web service interface and verifying that access is denied.
Actualizar exacqVision Web Service a una versión que no sea vulnerable. Consultar el advisory de Johnson Controls para obtener más información y la versión corregida.
Análise de vulnerabilidades e alertas críticos diretamente no seu e-mail.
CVE-2021-27664 is a critical vulnerability in exacqVision Web Service versions 21.06.11.0–21.06.11.0 that allows unauthenticated attackers to access stored credentials.
If you are running exacqVision Web Service version 21.06.11.0–21.06.11.0, you are potentially affected by this vulnerability.
Upgrade to a patched version of exacqVision Web Service as soon as it becomes available. Implement temporary mitigations like restricting network access until the upgrade is complete.
While no confirmed active exploitation campaigns are known, the vulnerability's severity and ease of exploitation make it a high-priority target.
Refer to the official exacqVision security advisory for detailed information and updates: [https://www.exacq.com/security-advisories/](https://www.exacq.com/security-advisories/)
Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.