The Faraday Technology (Grain-Media) DVRs are affected by a security vulnerability that allows unauthorized disclosure of sensitive information. This is due to the exposure of the command_port.ini
file over an unprotected HTTP channel. An attacker could exploit this vulnerability to engage in further unauthorized activities, such as accessing DVR (detailed in Submit #324403), affecting over 27,000 Internet-connected devices.
CWE-200: Information Exposure
Launch an HTTP GET request to the target device:
curl http://<DEVICE_IP_ADDR>/command_port.ini
This command will output the contents of command_port.ini
, revealing the DVR’s command port without requiring any form of authentication.
command_port.ini
file from unauthorized access by implementing proper authentication mechanisms.