[BreachExchange] Multiple Security Flaws Discovered in Visitor Management Systems

Destry Winant destry at riskbasedsecurity.com
Mon Mar 18 09:40:39 EDT 2019


https://www.securityweek.com/multiple-security-flaws-discovered-visitor-management-systems

Vulnerabilities discovered by IBM security researchers in five different
visitor management systems could be abused for data exfiltration or for
access to the underlying machines.

The analyzed systems include Lobby Track Desktop (Jolly Technologies),
EasyLobby Solo (HID Global), eVisitorPass (Threshold Security), Envoy
Passport (Envoy), and The Receptionist (The Receptionist).

A total of 19 vulnerabilities were discovered in these systems, and their
successful exploitation could lead to exfiltration of data such as visitor
logs, contact information, or corporate activities; complete takeover of
the application; or break out of the kiosk environment to interact with
Windows.

Based on the systems’ features and the deployment context, the attacker
could perform a variety of illicit operations, including gaining physical
access to an environment by acquiring a valid badge (some systems can issue
and provision radio frequency identification (RFID) badges).

“Even if the issued badges are not capable of opening doors, they may still
identify an attacker as a trusted outsider. A smile and gentle request for
help opening a locked door often goes unchallenged with a valid badge,” IBM
notes.

With the visitor management system capable of accessing the internal
network, an attacker may simply attempt to compromise the network to gain
foothold into the environment.

Provided that network access isn’t available and the visitor management
system can’t issue badges, the attacker could still abuse the discovered
vulnerabilities to access and exfiltrate data about the visitors. Depending
on the stored data, identity theft could also be possible.

The security researchers discovered seven vulnerabilities in the Lobby
Track Desktop, namely information disclosure (CVE-2018-17482,
CVE-2018-17483, and CVE-2018-17484), default account (CVE-2018-17485),
visitor records security bypass (CVE-2018-17486), and kiosk breakout
privilege escalation (CVE-2018-17487 and CVE-2018-17488).

EasyLobby Solo, the researchers say, is impacted by four security
vulnerabilities, namely information disclosure (CVE-2018-17489), denial of
service (CVE-2018-17490), privilege escalation (CVE-2018-17491), and
default account (CVE-2018-17492).

Five of the discovered vulnerabilities impact eVisitorPass. Four of them
are privilege escalation bugs (CVE-2018-17493, CVE-2018-17494,
CVE-2018-17495, and CVE-2018-17496), while the last one is a default admin
account (CVE-2018-17497).

The researchers found two vulnerabilities in Envoy Passport (affecting both
the Android and iOS applications), both of which are information disclosure
bugs (CVE-2018-17499 and CVE-2018-17500). A single flaw was discovered in
The Receptionist, also an information disclosure issue (CVE-2018-17502).

Information on these vulnerabilities was provided to the vendors prior to
publication, and patches have been already released, IBM says. Users of
these visitor management systems are advised to apply the available patches
as soon as possible, revoke admin privileges when they are not needed, use
full-disk encryption, and use strong passwords.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.riskbasedsecurity.com/pipermail/breachexchange/attachments/20190318/a6f89cee/attachment.html>


More information about the BreachExchange mailing list