Samsung DVR Web Viewer weak credentials
MITRE assigned me on January 4th 2017, CVE-2016-10113 for reporting this vulnerability.
Samsung DVR Web Viewer is by default using HTTP (port 80) and transmits the credentials encoded in the Cookie header using very bad security practice, just encoding the login and password in BASE64 codification. It is trivial to decode those values and gain access to Samsung DVR web interface to monitor and control IP cameras, if the default credentials have been changed.
document.cookie= 'ID='+encode64(document.login_page.id.value) +'&PWD='+encode64(document.login_page.pwd.value) +'&SessionID='+Math.random();
Link to the original advisory: https://www.securityfocus.com/archive/1/539944
We are sorry that this post was not useful for you!
Let us improve this post!
Tell us how we can improve this post?