Security
Headlines
HeadlinesLatestCVEs

Headline

AXIS A1001 System Flaws Expose Secure Facilities to Unauthorized Access

By Deeba Ahmed The new discovery could have far-reaching implications for Physical Access Control Systems and sensitive facilities. This is a post from HackRead.com Read the original post: AXIS A1001 System Flaws Expose Secure Facilities to Unauthorized Access

HackRead
#vulnerability#rce#pdf#buffer_overflow#auth

The high-severity vulnerability has been confirmed by the Cybersecurity and Infrastructure Security Agency (CISA), while Axis Communications has issued security patches, urging consumers to install them.

Leading OT cybersecurity firm OTORIO has discovered (PDF) a high-severity heap-based buffer overflow vulnerability in the AXIS A1001 system from Axis Communications. This system ensures secure access control, but the vulnerability exposes sensitive networks to various risks, including remote code execution.

For your information, Axis Communications AB is a Swedish manufacturer of network cameras, video encoders, and other surveillance products.

In an exclusive report shared with Hackread.com, the company explained that the buffer overflow flaw was discovered while communicating over OSDP. OTORIO researchers Ariel Harush and Roy Hodir wrote that the flaw is found in the pacsiod process, which handles the OSDP communications.

The high-severity vulnerability, tracked as CVE-2023-21406, allows message data to be written outside the heap-allocated buffer by appending invalid data to the OSDP message. Later, the data can be used for executing arbitrary code.

AXIS A1001 is an open, non-proprietary system designed for access management. Each door installs the controller individually, and the data is synchronized automatically between all existing system controllers. The controller support almost all RS 48 and Wiegand OSDP readers and comes with built-in software allowing access management for up to 33 controllers and an open API for larger installations.

The exploit for this flaw involves gaining physical access to the RS-48 twisted pair cable located at the rear end of an access control reader. The reader is positioned at the entrance of a security facility/perimeter. OTORIO’s researchers successfully demonstrated that a tamper protection bypass could further aggravate the risk.

What makes CVE-2023-21406 an issue of concern for the cybersecurity community is that attackers may exploit it for conducting RCE (remote code execution) on the internal access controller from outside the facility. An adversary may exploit the serial channel that enables reader-controller communication to gain unauthorized access and open doors. They may also tamper with logs on the access controller. In addition to that, the flaw can serve as a potent gateway to the internal IP network regardless of its air-gapped or segmented status.

The vulnerability impacts AXIS A1001 version 1.65.4 or earlier and is categorized as high severity with a CVSS score of 7.1. AXIS has already released a patch for the impacted devices to improve the OSDP message parser’s robustness. Users must immediately update the AXIS device software available here.

The research highlights the potential risks fortified OT networks could be exposed to. In its security advisory published on 25 July 2023, the Cybersecurity and Infrastructure Security Agency (CISA) in the United States confirmed this vulnerability and noted that commercial entities must minimize network exposure for control system devices/systems and ensure these aren’t accessible through the internet.

Nevertheless, these devices/systems must be isolated from business networks and protected via firewalls. Moreover, VPNs should be preferred when remote access is required.

  1. Stellar Cyber Safeguards OT Environments Alongside IT
  2. A Malware can fully compromise building control systems
  3. 100s of Russian Building Controllers Can be Remotely Hacked
  4. Controller flaws let hackers physically damage moving bridges
  5. Grids to Airports: TETRA Radio Hacking Risks Global Infrastructure

Related news

CVE-2023-21406

Ariel Harush and Roy Hodir from OTORIO have found a flaw in the AXIS A1001 when communicating over OSDP. A heap-based buffer overflow was found in the pacsiod process which is handling the OSDP communication allowing to write outside of the allocated buffer. By appending invalid data to an OSDP message it was possible to write data beyond the heap allocated buffer. The data written outside the buffer could be used to execute arbitrary code.  lease refer to the Axis security advisory for more information, mitigation and affected products and software versions.

HackRead: Latest News

Automating Data Encryption and Security Audits for Continuous Protection