CVE-2018-15534
📋 TL;DR
CVE-2018-15534 allows unauthenticated attackers to retrieve sensitive information including usernames and password hashes from Geutebrueck re_porter 16 systems by directly accessing /statistics/gscsetup.xml on TCP port 12003. This affects all Geutebrueck re_porter 16 installations before version 7.8.974.20. The vulnerability enables credential theft and potential system compromise.
💻 Affected Systems
- Geutebrueck re_porter 16
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain administrative access to the system, compromise the entire surveillance infrastructure, and potentially pivot to other network systems using stolen credentials.
Likely Case
Attackers steal credentials and gain unauthorized access to the video management system, potentially viewing/altering surveillance footage or disrupting operations.
If Mitigated
Credential exposure is prevented, but the service remains vulnerable to other attacks on the exposed port.
🎯 Exploit Status
Exploitation is trivial - simply making an HTTP GET request to the vulnerable endpoint. Multiple public exploit scripts are available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 7.8.974.20
Vendor Advisory: Unknown - no public vendor advisory found
Restart Required: Yes
Instructions:
1. Download version 7.8.974.20 or later from Geutebrueck. 2. Backup current configuration. 3. Install the update following vendor instructions. 4. Restart the re_porter service or system.
🔧 Temporary Workarounds
Network Access Control
linuxRestrict access to TCP port 12003 to only trusted IP addresses/networks
iptables -A INPUT -p tcp --dport 12003 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 12003 -j DROP
Web Server Configuration
allBlock access to /statistics/gscsetup.xml via web server configuration
<Location "/statistics/gscsetup.xml">
Order deny,allow
Deny from all
</Location>
🧯 If You Can't Patch
- Implement strict network segmentation and firewall rules to block all external access to port 12003
- Monitor for unauthorized access attempts to the vulnerable endpoint and implement credential rotation
🔍 How to Verify
Check if Vulnerable:
Run: curl -v http://TARGET_IP:12003/statistics/gscsetup.xml - if it returns XML containing user credentials, the system is vulnerable
Check Version:
Check the web interface or system configuration for version number, or contact vendor for version verification method
Verify Fix Applied:
Attempt the same curl command after patching - it should return an error or empty response instead of credentials
📡 Detection & Monitoring
Log Indicators:
- HTTP GET requests to /statistics/gscsetup.xml on port 12003
- Multiple failed authentication attempts following access to the endpoint
Network Indicators:
- Unusual traffic patterns to port 12003 from unauthorized sources
- HTTP requests to the vulnerable endpoint from unexpected IP addresses
SIEM Query:
source_port:12003 AND uri_path:"/statistics/gscsetup.xml"