OTPulse

Buffer Overflow Vulnerability in Siveillance Video Camera Drivers

Monitor6.7SSA-438590Oct 10, 2024
Attack VectorAdjacent
Auth RequiredNone
ComplexityHigh
User InteractionRequired
Summary

Several camera device drivers in the Siveillance Video Device Pack contain a buffer overflow vulnerability that could be exploited under strict conditions. This could allow an attacker to execute code with the permissions of the Recording Server user.

What this means
What could happen
An attacker could execute code on the Recording Server with the permissions of that service, potentially allowing them to modify video recordings, disable surveillance, or pivot to other systems on your network.
Who's at risk
Organizations running Siemens Siveillance Video recording systems should be concerned. This affects video surveillance infrastructure used in municipal facilities, utilities, and commercial buildings with Siemens video management systems deployed before version 13.2.
How it could be exploited
An attacker would need to send specially crafted data to a camera driver input that does not properly validate buffer size. This requires local or network access to the Recording Server and interaction with the device (a user would need to be present or a malicious device would need to be connected). Once exploited, the attacker gains code execution on the Recording Server itself.
Prerequisites
  • Network or local access to the Recording Server
  • A compatible camera device that can send malicious data to the driver
  • User interaction or presence of a malicious device on the network
  • Strict conditions on data format and timing (high complexity to exploit)
Buffer overflow vulnerabilityCode execution possibleRequires strict conditions and user interactionLow EPSS score (0.1%) - unlikely to be exploited in the wildMedium severity (CVSS 6.7)
Exploitability
Low exploit probability (EPSS 0.1%)
Affected products (1)
ProductAffected VersionsFix Status
Siveillance Video Device Pack< V13.213.2
Remediation & Mitigation
0/1
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXUpdate Siveillance Video Device Pack to version 13.2 or later
↑↓ Navigate · Esc Close
API: /api/v1/advisories/92357ef8-1694-4c46-8bd0-6bcff28c6290
Buffer Overflow Vulnerability in Siveillance Video Camera Drivers | CVSS 6.7 - OTPulse