ID

VAR-E-201310-0005


CVE

cve_id:CVE-2013-6236

Trust: 3.0

sources: BID: 63388 // PACKETSTORM: 124817 // EXPLOIT-DB: 29266 // EDBNET: 21531 // EDBNET: 51047

EDB ID

29266


TITLE

Stem Innovation - 'IZON' Hard-Coded Credentials - Hardware webapps Exploit

Trust: 0.6

sources: EXPLOIT-DB: 29266

DESCRIPTION

Stem Innovation - 'IZON' Hard-Coded Credentials. CVE-2013-6236CVE-99069 . webapps exploit for Hardware platform

Trust: 0.6

sources: EXPLOIT-DB: 29266

AFFECTED PRODUCTS

vendor:stemmodel:innovationscope: - version: -

Trust: 1.0

vendor:stemmodel:innovation izon hardcoded passwordscope: - version: -

Trust: 0.5

vendor:stemmodel:innovation llc izon ios mobile applicationscope:eqversion:1.0.5

Trust: 0.3

vendor:stemmodel:innovation llc izonscope:eqversion:2.0.2

Trust: 0.3

sources: BID: 63388 // PACKETSTORM: 124817 // EXPLOIT-DB: 29266

EXPLOIT

Stem Innovation ‘IZON’ Hard-coded Credentials (CVE-2013-6236)
Mark Stanislav - mstanislav@duosecurity.com

I. DESCRIPTION
---------------------------------------
Stem Innovation's IP camera called ‘IZON’ utilizes numerous hard-coded credentials within its Linux distribution and also the hidden web application running on the camera. These sets of credentials are never exposed to the end-user and cannot be changed through any normal operation of the camera. Further, using the web interface credentials will provide access to a camera stream and configuration details, including third-party API keys.

II. TESTED VERSION
---------------------------------------
iOS Mobile Application: 1.0.5
Camera Firmware: 2.0.2

III. PoC EXPLOIT
---------------------------------------
1) Telnet Credentials
* "root" with a password of "stemroot"
* "admin" with a password of "/ADMIN/"
* "mg3500" with a password of "merlin"

2) HTTP Credentials (http://camera-ip/mobileye/)
* "user" with a password of "user"

IV. SOLUTION
---------------------------------------
Update to the latest firmware and hope for the best.

V. REFERENCES
---------------------------------------
https://blog.duosecurity.com/2013/10/izon-ip-camera-hardcoded-passwords-and-unencrypted-data-abound/
https://securityledger.com/2013/10/apple-store-favorite-izon-cameras-riddled-with-security-holes/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6236

VI. TIMELINE
---------------------------------------
09/06/2013 - Initial vendor contact stating I wanted to discuss a variety of security issues
09/06/2013 - Vendor’s help desk responded and asked for clarification about my request
09/06/2013 - Responded to the vendor’s help desk and reaffirmed my purpose for contact
09/16/2013 - Updated my existing help desk ticket after not hearing back in 10 days
09/19/2013 - Received a response back to contact their CEO directly about these issues
09/19/2013 - E-mailed the vendor’s CEO with synopsis details and severity ratings for the key issues
09/30/2013 - I opened up a new help desk ticket to follow-up after not hearing from their CEO after 11 days
10/01/2013 - The new case was updated saying that their CEO was aware of my email and would respond
10/03/2013 - I received a follow-up from their CTO with no specific details about plans to fix issues
10/03/2013 - Followed-up with the CTO to ask for specific details about the issues I had found
10/14/2013 - CTO responded asking to “meet” to discuss my findings but again offered no details
10/14/2013 - Offered up time ranges for the next day that were viable to discuss my findings
10/17/2013 - Public presentation of camera research which included these issues
10/28/2013 - Still no response from vendor on confirmation of fixes or a timeline to do so

Trust: 1.0

sources: EXPLOIT-DB: 29266

EXPLOIT LANGUAGE

txt

Trust: 0.6

sources: EXPLOIT-DB: 29266

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 29266

TYPE

'IZON' Hard-Coded Credentials

Trust: 1.0

sources: EXPLOIT-DB: 29266

TAGS

tag:exploit

Trust: 0.5

sources: PACKETSTORM: 124817

CREDITS

Mark Stanislav

Trust: 0.6

sources: EXPLOIT-DB: 29266

EXTERNAL IDS

db:NVDid:CVE-2013-6236

Trust: 3.0

db:EXPLOIT-DBid:29266

Trust: 1.6

db:0DAYTODAYid:21775

Trust: 0.6

db:EDBNETid:21531

Trust: 0.6

db:EDBNETid:51047

Trust: 0.6

db:PACKETSTORMid:124817

Trust: 0.5

db:BIDid:63388

Trust: 0.3

sources: BID: 63388 // PACKETSTORM: 124817 // EXPLOIT-DB: 29266 // EDBNET: 21531 // EDBNET: 51047

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2013-6236

Trust: 2.7

url:https://0day.today/exploits/21775

Trust: 0.6

url:https://www.exploit-db.com/exploits/29266/

Trust: 0.6

url:https://securityledger.com/2013/10/apple-store-favorite-izon-cameras-riddled-with-security-holes/

Trust: 0.3

url:https://blog.duosecurity.com/2013/10/izon-ip-camera-hardcoded-passwords-and-unencrypted-data-abound/

Trust: 0.3

url:http://www.securityfocus.com/archive/1/529490

Trust: 0.3

url:http://steminnovation.com/

Trust: 0.3

sources: BID: 63388 // PACKETSTORM: 124817 // EXPLOIT-DB: 29266 // EDBNET: 21531 // EDBNET: 51047

SOURCES

db:BIDid:63388
db:PACKETSTORMid:124817
db:EXPLOIT-DBid:29266
db:EDBNETid:21531
db:EDBNETid:51047

LAST UPDATE DATE

2022-07-27T09:24:46.078000+00:00


SOURCES UPDATE DATE

db:BIDid:63388date:2013-10-24T00:00:00

SOURCES RELEASE DATE

db:BIDid:63388date:2013-10-24T00:00:00
db:PACKETSTORMid:124817date:2014-01-17T19:02:22
db:EXPLOIT-DBid:29266date:2013-10-29T00:00:00
db:EDBNETid:21531date:2014-01-19T00:00:00
db:EDBNETid:51047date:2013-10-29T00:00:00