[NEWS] Axis Network Camera HTTP Authentication Bypass
From: SecuriTeam (support_at_securiteam.com)
To: firstname.lastname@example.org Date: 29 May 2003 20:02:44 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
In the US?
Contact Beyond Security at our new California office
housewarming rates on automated network vulnerability
scanning. We also welcome ISPs and other resellers!
Please contact us at: 323-882-8286 or email@example.com
- - - - - - - - -
Axis Network Camera HTTP Authentication Bypass
An <http://www.axis.com> Axis Network Camera captures and transmits live
images directly over an IP network (e.g. LAN/intranet/Internet), enabling
users to remotely view and/or manage the camera from a Web browser on any
After setting up the Axis Camera, the user is provided with Web-based
Administration Tools for configuring and managing the camera by accessing
http://camera-ip/admin/admin.shtml, which requires a username and
We have discovered the following security vulnerability: by accessing
http://camera-ip//admin/admin.shtml (notice the double slash), the
authentication for "admin" is bypassed and an attacker gains direct access
to the configuration.
Using this vulnerability, an attacker can reset the root password, then
enable the telnet server by modifying configuration files, giving the
attacker interactive access to a Unix like command line, allowing her to
execute arbitrary commands as root.
* AXIS 2100 Network Camera versions 2.32 and previous
* AXIS 2110 Network Camera versions 2.32 and previous
* AXIS 2120 Network Camera versions 2.32 and previous
* AXIS 2130 PTZ Network Camera versions 2.32 and previous
* AXIS 2400 Video Server versions 2.32 and previous
* AXIS 2401 Video Server versions 2.32 and previous
* AXIS 2420 Network Camera versions 2.32 and previous
* AXIS 2460 Network DVR versions 3.00 and previous
* AXIS 250S Video Server versions 3.02 and previous
Axis Communications has released new firmware closing this vulnerability
in its Network Camera and Video Server products.
New releases are available at:
AXIS 2100 Network Camera: 2.34
AXIS 2110 Network Camera: 2.34
AXIS 2120 Network Camera: 2.34
AXIS 2130 Network Camera: 2.34
AXIS 2400 Video Server: 2.34
AXIS 2401 Video Server: 2.34
AXIS 2420 Network Camera: 2.34
AXIS 2460 Network DVR: 3.10
AXIS 250S Video Server: 3.03
CORE Security strongly recommends that all devices are updated to these
Technical Description - Exploit/Concept Code:
CORE Security has discovered the following security vulnerability: by
accessing http://camera-ip//admin/admin.shtml (notice the double slash)
the authentication for "admin" is bypassed and an attacker gains direct
access to the configuration.
In the same way, an attacker can access the other administration tools for
the camera, for example:
Note that the workaround for a recently published Axis HTTP Server
vulnerability (see reference ) was to add authentication to some
particular paths. With this vulnerability the authentication can be
bypassed, so the mentioned Information Disclosure vulnerability can still
The affected Axis devices run a Linux like operating system. With this
vulnerability, an attacker can reset the root password. Then using the
default open ftp server, the attacker can download configuration files,
modify these files and upload them again. Modifying /etc/inittab it is
possible to enable the Telnet server (see  a technical note explaining
how to enable Telnet support), giving the attacker interactive access to a
UNIX like command line. Axis provides free developer tools (see ), so
it is feasible for an attacker to build tools like port scanners or
proxies to start attacks from the compromised camera (which is usually
installed inside internal networks) which could lead to the compromise of
the internal network.
 Axis Communications HTTP Server Messages Information Disclosure
Vulnerability (published 2003-02-28)
 Technical Note: Enable Telnet Support in the Axis Camera Servers
stated in this page: "You should enable this option for experimental use
only. Never leave the Telnet access enabled when having the Network Camera
installed on a public site."
The information has been provided by <mailto:firstname.lastname@example.org>
CORE Security Technologies Advisories.
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: email@example.com
In order to subscribe to the mailing list, simply forward this email to: firstname.lastname@example.org
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.