CVE-2017-15304

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to bypass authentication on Airtame HDMI dongles by setting their own session ID cookie, enabling persistent access to the admin panel even after password changes. It affects all Airtame devices running firmware versions before 3.0.

💻 Affected Systems

Products:
  • Airtame HDMI dongle
Versions: All firmware versions before 3.0
Operating Systems: Embedded Linux on Airtame device
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the web panel's login.php component. All default configurations are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Airtame device allowing attackers to maintain persistent admin access, potentially enabling further network attacks or device misuse.

🟠

Likely Case

Unauthorized access to the admin panel allowing configuration changes, device hijacking, or network reconnaissance.

🟢

If Mitigated

Limited impact if devices are isolated from untrusted networks and proper access controls are implemented.

🌐 Internet-Facing: HIGH - Devices exposed to the internet are directly vulnerable to remote exploitation.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only setting a custom PHPSESSID cookie header. No authentication or special tools needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware 3.0 and later

Vendor Advisory: https://airtame.com/security/

Restart Required: Yes

Instructions:

1. Access Airtame admin panel. 2. Navigate to Settings > System Update. 3. Check for and install firmware version 3.0 or later. 4. Reboot the device after update completes.

🔧 Temporary Workarounds

Network isolation

all

Isolate Airtame devices from untrusted networks and restrict access to authorized IPs only.

Disable web panel

all

Disable the web administration interface if not required for operations.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Airtame devices from untrusted networks
  • Monitor for unauthorized access attempts and review admin panel access logs regularly

🔍 How to Verify

Check if Vulnerable:

Check firmware version in admin panel Settings > About. If version is below 3.0, device is vulnerable.

Check Version:

curl -s http://[airtame-ip]/api/v1/system/info | grep version

Verify Fix Applied:

Verify firmware version is 3.0 or higher in Settings > About. Test authentication bypass by attempting to set custom PHPSESSID cookie.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful access with custom session IDs
  • Admin panel access from unusual IP addresses

Network Indicators:

  • HTTP requests to /bin/login.php with custom PHPSESSID headers
  • Unusual admin panel traffic patterns

SIEM Query:

source="airtame.logs" AND (uri="/bin/login.php" AND cookie="PHPSESSID=*")

🔗 References

📤 Share & Export