CVE-2018-7228

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated remote attackers to bypass authentication mechanisms on Schneider Electric Pelco Sarix Professional cameras, granting them administrator privileges. All organizations using these cameras with firmware versions prior to 3.29.67 are affected. Attackers can gain complete control over the devices without any credentials.

💻 Affected Systems

Products:
  • Schneider Electric Pelco Sarix Professional cameras
Versions: All firmware versions prior to 3.29.67
Operating Systems: Embedded camera firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of camera systems allowing attackers to disable surveillance, manipulate video feeds, pivot to internal networks, or use cameras as footholds for further attacks.

🟠

Likely Case

Attackers gain administrative access to cameras, enabling them to view live feeds, modify settings, disable recording, or install malicious firmware.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to camera systems only, preventing lateral movement to critical infrastructure.

🌐 Internet-Facing: HIGH - Directly exposed cameras can be compromised by any internet-based attacker without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or malware could exploit this, but requires network access to camera management interfaces.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Authentication bypass vulnerabilities are typically easy to exploit with publicly available tools. The high CVSS score indicates trivial exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.29.67 or later

Vendor Advisory: https://www.schneider-electric.com/en/download/document/SEVD-2018-058-01/

Restart Required: Yes

Instructions:

1. Download firmware version 3.29.67 or later from Schneider Electric portal. 2. Access camera web interface. 3. Navigate to Maintenance > Firmware Upgrade. 4. Upload new firmware file. 5. Wait for automatic reboot and verification.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate cameras on separate VLAN with strict firewall rules preventing external access to management interfaces.

Access Control Lists

all

Implement IP-based restrictions allowing only authorized management stations to access camera web interfaces.

🧯 If You Can't Patch

  • Segment cameras on isolated network with no internet access
  • Implement strict firewall rules blocking all external access to camera management ports (typically 80, 443, 554)

🔍 How to Verify

Check if Vulnerable:

Check firmware version via camera web interface: Login > Maintenance > System Information. Compare version against 3.29.67.

Check Version:

No CLI command - check via web interface at http://[camera-ip]/ or via ONVIF device management tools

Verify Fix Applied:

After upgrade, verify firmware version shows 3.29.67 or higher in System Information page.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful admin access from same IP
  • Configuration changes from unauthenticated IP addresses
  • Firmware update attempts from unauthorized sources

Network Indicators:

  • HTTP/HTTPS requests to camera management interface without authentication headers
  • Unusual traffic patterns to camera ports from external IPs
  • ONVIF protocol abuse attempts

SIEM Query:

source_ip="external" AND dest_port IN (80,443,554) AND dest_ip="camera_subnet" AND (http_status=200 OR auth_success=true)

🔗 References

📤 Share & Export