Overview
CVE-2020-36873 describes a critical vulnerability affecting Astak CM-818T3 2.4GHz wireless security surveillance cameras. This flaw allows unauthenticated remote attackers to download a compressed configuration backup file directly from the camera via the /web/cgi-bin/hi3510/backup.cgi endpoint. This backup contains sensitive information, including administrative credentials, potentially leading to full compromise of the device and potentially impacting the connected network.
Technical Details
The vulnerability lies in the lack of authentication or authorization checks before serving the configuration backup file. By simply accessing the /web/cgi-bin/hi3510/backup.cgi endpoint, a remote attacker can download a .tar.gz archive. This archive contains configuration files which commonly store passwords (often in plaintext or easily reversible formats), network settings, and other sensitive information. The exposure of this data enables an attacker to gain complete control over the camera and potentially use it as a pivot point to access other devices on the network.
CVSS Analysis
Unfortunately, a CVSS score is not currently available. However, given the ease of exploitation (no authentication required) and the severity of the impact (full device compromise and potential network access), this vulnerability should be considered high severity. A proper CVSS score would likely place it in the Critical or High range due to the unauthenticated remote information disclosure.
Possible Impact
The impact of CVE-2020-36873 is significant. An attacker exploiting this vulnerability could:
- Gain complete control of the Astak CM-818T3 camera.
- Access live video feeds and recorded footage.
- Modify camera settings, including disabling recording or altering the field of view.
- Use the compromised camera as a stepping stone to attack other devices on the network.
- Potentially inject malicious code into the camera’s firmware.
- Obtain sensitive information about the camera’s environment (e.g., user schedules, network topology).
Mitigation or Patch Steps
Unfortunately, concrete patch information or firmware updates directly from Astak appear unavailable as of the last update of this article. Given the lack of official support, the following mitigation steps are recommended:
- Isolate the Camera: Place the Astak CM-818T3 camera on a separate network segment (VLAN) to limit its access to other devices.
- Firewall Restrictions: Implement firewall rules to restrict access to the camera from the internet and untrusted internal networks. Only allow necessary traffic.
- Monitor Network Traffic: Monitor network traffic to and from the camera for suspicious activity.
- Consider Replacement: Given the severity of the vulnerability and the lack of vendor support, consider replacing the Astak CM-818T3 camera with a more secure alternative from a reputable vendor that provides timely security updates.
