CVE-2018-15534

9.8 CRITICAL

📋 TL;DR

CVE-2018-15534 allows unauthenticated attackers to retrieve sensitive information including usernames and password hashes from Geutebrueck re_porter 16 systems by directly accessing /statistics/gscsetup.xml on TCP port 12003. This affects all Geutebrueck re_porter 16 installations before version 7.8.974.20. The vulnerability enables credential theft and potential system compromise.

💻 Affected Systems

Products:
  • Geutebrueck re_porter 16
Versions: All versions before 7.8.974.20
Operating Systems: Unknown - likely embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default configuration and requires no special settings to be exploitable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to the system, compromise the entire surveillance infrastructure, and potentially pivot to other network systems using stolen credentials.

🟠

Likely Case

Attackers steal credentials and gain unauthorized access to the video management system, potentially viewing/altering surveillance footage or disrupting operations.

🟢

If Mitigated

Credential exposure is prevented, but the service remains vulnerable to other attacks on the exposed port.

🌐 Internet-Facing: HIGH - The vulnerability requires only network access to port 12003 and no authentication, making internet-exposed systems extremely vulnerable.
🏢 Internal Only: HIGH - Even internally, any attacker with network access can exploit this without credentials.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is trivial - simply making an HTTP GET request to the vulnerable endpoint. Multiple public exploit scripts are available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.8.974.20

Vendor Advisory: Unknown - no public vendor advisory found

Restart Required: Yes

Instructions:

1. Download version 7.8.974.20 or later from Geutebrueck. 2. Backup current configuration. 3. Install the update following vendor instructions. 4. Restart the re_porter service or system.

🔧 Temporary Workarounds

Network Access Control

linux

Restrict access to TCP port 12003 to only trusted IP addresses/networks

iptables -A INPUT -p tcp --dport 12003 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 12003 -j DROP

Web Server Configuration

all

Block access to /statistics/gscsetup.xml via web server configuration

<Location "/statistics/gscsetup.xml">
    Order deny,allow
    Deny from all
</Location>

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to block all external access to port 12003
  • Monitor for unauthorized access attempts to the vulnerable endpoint and implement credential rotation

🔍 How to Verify

Check if Vulnerable:

Run: curl -v http://TARGET_IP:12003/statistics/gscsetup.xml - if it returns XML containing user credentials, the system is vulnerable

Check Version:

Check the web interface or system configuration for version number, or contact vendor for version verification method

Verify Fix Applied:

Attempt the same curl command after patching - it should return an error or empty response instead of credentials

📡 Detection & Monitoring

Log Indicators:

  • HTTP GET requests to /statistics/gscsetup.xml on port 12003
  • Multiple failed authentication attempts following access to the endpoint

Network Indicators:

  • Unusual traffic patterns to port 12003 from unauthorized sources
  • HTTP requests to the vulnerable endpoint from unexpected IP addresses

SIEM Query:

source_port:12003 AND uri_path:"/statistics/gscsetup.xml"

🔗 References

📤 Share & Export