Categories: Breaking NewsHacking

How to exploit flaws in InFocus IN3128HD Projector to hack host network

The firmware running on the InFocus IN3128HD Projector is affected by an authentication bypass flaw which allows the hack of the host network.

Another smart object was found vulnerable by security experts, it is a popular projector commonly used in classrooms. The manufacturer has discovered several authentication flaws affecting the firmware running on the projector, the vulnerabilities could be exploited by attackers the host network.

The vulnerable firmware (version 0.26) runs on the projector InFocus IN3128HD, as many other Internet of Things devices exposes a web interface to modify its settings. The administration console requires an admin password to access the configuration of the  InFocus IN3128HD projector, but an authentication bypass flaw affecting the firmware could allow an attacker to modify any parameters by simply guessing the name of the page (main.html) that users are directed to after they complete a successful login. This means that just using the proper URL an attacker can bypass that login page.

“The InFocus IN3128HD projector web server interface requires an admin password in order to view or modify the device configuration parameters. The vulnerability [CVE-2014-8383] is caused by a user’s ability to bypass the login page (index.html) by knowing the name of the page (main.html) to which a logged user is forwarded after entering the correct password. The restricted pages contain no control whatsoever of logged or unauthenticated users. The login only checks the entered password and does not generate a session cookie if the user logs in correctly. The following URL allows an alternate preauth path to the restricted section” states the researcher with Core Security’s CoreLabs Joaquin Rodriguez Varela.

Once bypassed the authentication mechanism, the attacker could gain and modify network settings (i.e. network mask, DNS server, gateway) or Wi-Fi configuration, including its password.

At this point, it is easy to imagine the consequence for the disclosure of the WiFi password.

Varela highlighted that the firmware also lacks authentication for the “webctrl.cgi.elf” CGI file, used to commit the changes.webctrl.cgi.elf” CGI file, used to commit the changes.

Verela explained that using this file it is possible to change once again the device parameters, including the DHCP setting, and force remotely the reboot of the InFocus IN3128HD projector.

Varela reported the flaws to the InFocus company that claimed the researchers at Core “no longer had any desire to see the advisory.”

In time I’m writing, InFocus still haven’t provided any update for the vulnerable firmware. Waiting for a fix, Core is suggesting owners of InFocus IN3128HD projector to isolate the devices from public networks.

Pierluigi Paganini

(Security Affairs –  InFocus IN3128HD vulnerability, hacking)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Google addressed 2 Chrome zero-days demonstrated at Pwn2Own 2024

Google addressed two zero-day vulnerabilities in the Chrome web browser that have been demonstrated during…

10 hours ago

INC Ransom stole 3TB of data from the National Health Service (NHS) of Scotland

The INC Ransom extortion group hacked the National Health Service (NHS) of Scotland and is threatening…

15 hours ago

CISA adds Microsoft SharePoint bug disclosed at Pwn2Own to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a Microsoft SharePoint vulnerability disclosed at the…

20 hours ago

The DDR Advantage: Real-Time Data Defense

This is the advantage of Data Detection and Response (DDR) for organizations aiming to build…

23 hours ago

Finnish police linked APT31 to the 2021 parliament attack

The Finnish Police attributed the attack against the parliament that occurred in March 2021 to…

1 day ago

TheMoon bot infected 40,000 devices in January and February

A new variant of TheMoon malware infected thousands of outdated small office and home office…

2 days ago

This website uses cookies.