CVE-2020-24051
📋 TL;DR
This vulnerability allows unauthenticated attackers to bypass authentication checks in Moog EXO Series units' ONVIF protocol implementation. Attackers can execute privileged operations like creating new administrator accounts without credentials. This affects Moog EXO Series EXVF5C-2 and EXVP7C2-3 units using ONVIF protocol.
💻 Affected Systems
- Moog EXO Series EXVF5C-2
- Moog EXO Series EXVP7C2-3
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise where attackers gain administrative control, create persistent backdoors, disable security features, and potentially pivot to other network systems.
Likely Case
Attackers create unauthorized administrator accounts, modify system configurations, access video feeds, and disable legitimate user access.
If Mitigated
Limited impact if systems are isolated in secure networks with strict access controls and monitoring, though authentication bypass remains possible.
🎯 Exploit Status
Exploitation requires sending specially crafted ONVIF requests. Public details available in IOActive disclosures.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Contact Moog for specific patched firmware versions
Vendor Advisory: https://ioactive.com/moog-exo-series-multiple-vulnerabilities/
Restart Required: Yes
Instructions:
1. Contact Moog for latest firmware. 2. Backup configurations. 3. Apply firmware update via management interface. 4. Verify authentication requirements work properly.
🔧 Temporary Workarounds
Network Segmentation
allIsolate Moog EXO units in separate VLANs with strict firewall rules limiting ONVIF access to authorized management systems only.
Disable ONVIF if Unused
allDisable ONVIF protocol in device settings if not required for operations.
🧯 If You Can't Patch
- Implement strict network access controls allowing only trusted IP addresses to communicate with ONVIF ports (typically 80, 443, 8899)
- Enable detailed logging for authentication attempts and monitor for unauthorized administrative account creation
🔍 How to Verify
Check if Vulnerable:
Test ONVIF authentication by attempting privileged operations without credentials using tools like ONVIF Device Manager or custom scripts.
Check Version:
Check firmware version via web interface or ONVIF GetSystemDateAndTime request
Verify Fix Applied:
After patching, verify that authentication is required for all ONVIF privileged operations and test authentication bypass attempts fail.
📡 Detection & Monitoring
Log Indicators:
- Failed authentication attempts followed by successful privileged operations
- Unexpected administrator account creation events
- ONVIF requests from unauthorized sources
Network Indicators:
- ONVIF SOAP requests to privileged endpoints without authentication headers
- Traffic to ONVIF ports from unexpected IP addresses
SIEM Query:
source_ip=* AND (dest_port=80 OR dest_port=443 OR dest_port=8899) AND (http_user_agent CONTAINS "ONVIF" OR protocol="ONVIF") AND NOT auth_success=true AND action="privileged_operation"