CVE-2020-27553

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers with network access to download any files from the /etc directory on BASETech IP cameras. It affects BASETech GE-131 BT-1837836 cameras with vulnerable firmware, potentially exposing sensitive configuration files and credentials.

💻 Affected Systems

Products:
  • BASETech GE-131 BT-1837836 IP Camera
Versions: Firmware 20180921
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with the misconfigured DocumentRoot setting pointing to /etc directory.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through exposure of passwords, cryptographic keys, and configuration files, leading to device takeover, network pivoting, or credential harvesting.

🟠

Likely Case

Exfiltration of sensitive configuration files containing passwords, network settings, and device credentials that could enable further attacks.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external access to the web server.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP GET requests to download files from /etc directory without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None known

Restart Required: No

Instructions:

No official patch available. Consider replacing affected devices or implementing network controls.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected cameras from internet and restrict network access to trusted management networks only.

Web Server Configuration Change

linux

If device allows configuration changes, modify DocumentRoot to point to proper web directory instead of /etc.

🧯 If You Can't Patch

  • Remove affected devices from internet-facing networks immediately
  • Implement strict firewall rules to allow only necessary traffic to camera management interface

🔍 How to Verify

Check if Vulnerable:

Attempt to access http://[camera-ip]/passwd or other known /etc files without authentication. If files download, device is vulnerable.

Check Version:

Check firmware version in web interface or via device documentation.

Verify Fix Applied:

Verify that accessing /etc files via web server returns 404 or access denied errors.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP GET requests to /etc/* files
  • Multiple failed authentication attempts followed by successful file downloads

Network Indicators:

  • HTTP requests to /etc directory from unauthorized IP addresses
  • Unusual outbound traffic patterns after file access

SIEM Query:

source="web_server" AND (uri="/etc/*" OR uri CONTAINS "/etc/") AND response_code=200

🔗 References

📤 Share & Export