The U.S. Cybersecurity and Infrastructure Security Agency (CISA) published an advisory to warn of critical flaws affecting access control systems manufactured by Prima Systems.
Prima access control has a wide range of solutions, including wall-mounted readers, electronic lock cylinders, parking access control, and elevator control. The list of flaws includes OS Command Injection, Unrestricted Upload of File with Dangerous Type, Cross-site Request Forgery, Small Space of Random Values, Cross-site Scripting, Exposure of Backup file to Unauthorized Control Sphere, Improper Authentication, and Use of Hard-coded Credentials.
The flaws, reported by Gjoko Krstic of Applied Risk, could be easily exploited by remote attackers to gain full system access on affected systems, the issues affect Prima FlexAir Versions 2.3.38 and prior.
“Exploitation of these vulnerabilities may allow an attacker to execute commands directly on the operating system, upload malicious files, perform actions with administrative privileges, execute arbitrary code in a user’s browser, discover login credentials, bypass normal authentication, and have full system access,” reads the security advisory published by CISA.
The most severe vulnerability, tracked as CVE-2019-7670, is an OS command injection flaw.
“Prima Systems FlexAir, Versions 2.3.38 and prior. The application incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component, which could allow attackers to execute commands directly on the operating system.” reads the description for the flaw.
The vulnerability received a CVSS score of 10.
Another issue, tracked as CVE-2019-7669, is an improper validation of file extensions when uploading files that was rated as CVSS score of 9.1. The vulnerability could be exploited by a remote authenticated attacker to upload and execute malicious applications within the application’s web root with root privileges.
Another critical issue, tracked as CVE-2019-7672, received a CVSS score of 8.8.
“The flash version of the web interface contains a hard-coded username and password, which may allow an authenticated attacker to escalate privileges.” reads the advisory published by the NIST.
The expert also discovered that the application generates database backup files with a predictable name. This issue, tracked as CVE-2019-7667 could be exploited by an attacker to carry out brute-force attacks to identify the database backup file name. The attacker could then download the database and disclose login information, then use it to gain full access to the system.
Prima Systems addressed these vulnerabilities with the release of the version 2.5.12.
“To update to the latest firmware, each user should select the “Check for Upgrade” option in the “Centrals” menu in the GUI. The user’s controller will connect to the Prima Systems server and update to the latest version.” concludes the CISA advisory.
“CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – Prima FlexAir, hacking)
[adrotate banner=”5″]
[adrotate banner=”13″]
Sophos warns that a DragonForce ransomware operator chained three vulnerabilities in SimpleHelp to target a…
A new Russia-linked APT group, tracked as Laundry Bear, has been linked to a Dutch…
Nova Scotia Power confirms it was hit by a ransomware attack but hasn't paid the…
Cetus Protocol reported a $223 million crypto theft and is offering to drop legal action…
SafePay ransomware hit Marlboro-Chesterfield Pathology, stealing personal data of 235,000 people in a major breach.…
China-linked APT exploit Ivanti EPMM flaws to target critical sectors across Europe, North America, and…
This website uses cookies.