VideoInsight Web Client
Monitor7.3ICS-CERT ICSA-17-012-02Jan 12, 2017
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary
VideoInsight Web Client versions 6.3.5.11 and earlier contain a SQL injection vulnerability in the web interface. User input is not properly sanitized before being used in database queries, allowing an attacker to execute arbitrary SQL commands against the system database. An unauthenticated attacker on the network can exploit this remotely through the HTTP/HTTPS port.
What this means
What could happen
An attacker could execute SQL commands on the VideoInsight Web Client database, potentially accessing, modifying, or deleting video surveillance data and system configuration. Unauthorized access to surveillance systems could compromise security monitoring of critical infrastructure.
Who's at risk
Organizations operating VideoInsight Web Client-based surveillance systems should care about this vulnerability. This applies to water utilities, electric substations, treatment plants, and other critical infrastructure facilities that rely on VideoInsight for physical security monitoring and surveillance. Version 6.3.5.11 and earlier are affected.
How it could be exploited
An attacker sends a crafted request containing SQL code through the web interface to port 80/443. The vulnerable code does not properly validate user input before passing it to the database query, allowing the SQL commands to execute with the application's database privileges.
Prerequisites
- Network access to the Web Client HTTP/HTTPS port (80/443)
- No authentication required
remotely exploitableno authentication requiredlow complexityno patch availableaffects security monitoring systems
Exploitability
Low exploit probability (EPSS 0.6%)
Affected products (1)
ProductAffected VersionsFix Status
Web Client:≤ 6.3.5.11No fix (EOL)
Remediation & Mitigation
0/4
Do now
0/1WORKAROUNDDisable or restrict network access to the VideoInsight Web Client to only authorized networks using a firewall or network access control list
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
HOTFIXPlan migration away from Web Client version 6.3.5.11 or earlier to a supported alternative VideoInsight solution or replacement surveillance platform
Mitigations - no patch available
0/2Web Client: has reached End of Life. The vendor will not release a patch. Apply the following compensating controls:
HARDENINGImplement network segmentation to isolate the Web Client from untrusted networks and the internet
HARDENINGMonitor database activity logs for suspicious queries or access patterns that may indicate exploitation attempts
CVEs (1)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/bde3bba3-fd4d-4b2e-b58f-aeea4a4fc07c