Path Traversal Vulnerability in Siveillance Video DLNA Server
Plan Patch8.6SSA-755517Nov 9, 2021
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary
Siveillance Video DLNA Server contains a path traversal vulnerability that allows an authenticated remote attacker to access sensitive information on the DLNA server through directory traversal in file path handling.
What this means
What could happen
An attacker with valid credentials could read files outside the intended directory structure on the DLNA server, potentially exposing sensitive configuration data, recordings, or system files that could be used for further attacks.
Who's at risk
Security operations centers and video surveillance facilities using Siemens Siveillance Video systems should prioritize this advisory. Affected sites rely on DLNA servers for streaming and managing surveillance video feeds; compromised servers could expose recordings and access patterns that impact physical security monitoring capability.
How it could be exploited
An attacker must first obtain valid authentication credentials for the DLNA server. They then craft specially formatted file path requests containing directory traversal sequences (such as "../") to access files outside the normal service directory. The server processes these requests without proper path validation and returns unauthorized files.
Prerequisites
- Valid user credentials for DLNA server authentication
- Network access to the DLNA server port and service
- Knowledge of the DLNA API or file access interface
Remotely exploitableRequires valid credentialsLow attack complexityAffects security system (video surveillance)
Exploitability
Low exploit probability (EPSS 1.0%)
Affected products (1)
ProductAffected VersionsFix Status
Siveillance Video DLNA Server2019 R1; 2019 R2; 2019 R3 and 4 moreNo fix yet
Remediation & Mitigation
0/3
Do now
0/2HARDENINGRestrict network access to the DLNA server to authorized administrative workstations using firewall rules
WORKAROUNDDisable DLNA server if it is not actively used in your facility
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
HOTFIXApply the latest available DLNA Server hotfix installer to all Siveillance Video deployments
CVEs (1)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/79fdd727-bf5a-44ce-9f9a-ba19e1606a9a