Headline
CVE-2023-0750: PEC 1864: Web UI for configuration
Yellobrik PEC-1864 implements authentication checks via javascript in the frontend interface. When the device can be accessed over the network an attacker could bypass authentication. This would allow an attacker to : - Change the password, resulting in a DOS of the users - Change the streaming source, compromising the integrity of the stream - Change the streaming destination, compromising the confidentiality of the stream This issue affects Yellowbrik: PEC 1864. No patch has been issued by the manufacturer as this model was discontinued.
Knowledge base
Welcome to LYNX Technik AG Technical Support. Below you will find our Knowledge Base. You can either browse for an article by reviewing the topic headings, or you can search the Knowledge Base by entering a search term (for example “PVD 5840 AV Delay”….). If you are a registered user and currently logged into the system then you can also search your support tickets in the same way. If the Knowledge Base does not provide the answers you require, then please open a new ticket to submit your specific questions.
Modified on: Thu, 6 Apr, 2023 at 11:44 AM
PEC 1864 does not support RTMPS streaming protocol
WebUI uses HTTP only, i.e. is unencrypted and unsecure. Device should only be connected to secure/private networks.
Security Note: PEC-1864 is vulnerable to Authentication bypass (CVE-2023-0750). All versions are concerned, it is recommended to not have it connected to a public network.
Did you find it helpful? Yes No
Send feedback
Sorry we couldn’t be helpful. Help us improve this article with your feedback.
Related Articles