CVE-2019-20451

9.8 CRITICAL

📋 TL;DR

This vulnerability allows authenticated attackers to execute arbitrary code on Prismview systems by uploading malicious shortcut files and triggering reboot commands. It affects Prismview System 9 and Prismview Player 11 installations with vulnerable versions. Attackers can obtain credentials from an accessible XML file to bypass authentication requirements.

💻 Affected Systems

Products:
  • Prismview System 9
  • Prismview Player 11
Versions: Prismview System 9 11.10.17.00 and earlier; Prismview Player 11 13.09.1100 and earlier
Operating Systems: Windows-based systems running Prismview software
Default Config Vulnerable: ⚠️ Yes
Notes: Requires HTTP API access and credential access via XML file download.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise leading to ransomware deployment, data exfiltration, or integration into botnets for further attacks.

🟠

Likely Case

Remote code execution allowing attackers to install backdoors, steal credentials, or disrupt display operations.

🟢

If Mitigated

Limited impact if proper network segmentation and authentication controls prevent credential access.

🌐 Internet-Facing: HIGH - Systems exposed to internet are directly vulnerable to remote exploitation.
🏢 Internal Only: HIGH - Internal attackers or compromised internal systems can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires obtaining credentials from accessible XML file first, then simple file upload and command execution.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check with Prismview vendor for updated versions

Vendor Advisory: Not publicly documented

Restart Required: Yes

Instructions:

1. Contact Prismview vendor for security updates. 2. Apply patches to affected systems. 3. Restart services after patching. 4. Verify HTTP API security settings.

🔧 Temporary Workarounds

Restrict HTTP API Access

windows

Block external access to Prismview HTTP API using firewall rules

netsh advfirewall firewall add rule name="Block Prismview API" dir=in action=block protocol=TCP localport=80,443 remoteip=any

Secure Credential XML File

windows

Restrict access to XML files containing credentials using file permissions

icacls "C:\Path\To\Prismview\*.xml" /deny Everyone:(R)

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Prismview systems from untrusted networks
  • Monitor for suspicious file uploads to RebootSystem.lnk and requests to /REBOOTSYSTEM or /RESTARTVNC endpoints

🔍 How to Verify

Check if Vulnerable:

Check if system runs Prismview System 9 version 11.10.17.00 or earlier, or Prismview Player 11 version 13.09.1100 or earlier, and has HTTP API accessible.

Check Version:

Check Prismview software interface or configuration files for version information

Verify Fix Applied:

Verify updated version is installed and test that /REBOOTSYSTEM and /RESTARTVNC endpoints no longer accept unauthorized requests.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /REBOOTSYSTEM or /RESTARTVNC endpoints
  • File creation events for RebootSystem.lnk
  • Authentication failures followed by XML file access

Network Indicators:

  • HTTP POST requests with file uploads to Prismview API
  • Unusual outbound connections from Prismview systems

SIEM Query:

source="prismview.log" AND (uri="/REBOOTSYSTEM" OR uri="/RESTARTVNC" OR file="RebootSystem.lnk")

🔗 References

📤 Share & Export