CVE-2020-28334
📋 TL;DR
Barco wePresent WiPG-1600W devices contain a hardcoded root password hash in their firmware, allowing attackers to gain full system control. This affects devices running vulnerable firmware versions. Attackers can chain this with other vulnerabilities to achieve remote root access without authentication.
💻 Affected Systems
- Barco wePresent WiPG-1600W
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete device compromise allowing attackers to install persistent backdoors, intercept network traffic, pivot to internal networks, and render devices inoperable.
Likely Case
Attackers gain root shell access to manipulate device settings, steal credentials, or use device as foothold for lateral movement.
If Mitigated
Limited impact if devices are isolated in separate VLANs with strict network segmentation and access controls.
🎯 Exploit Status
Can be chained with CVE-2020-28329, CVE-2020-28330, and CVE-2020-28331 for complete remote-to-root exploit chain.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Contact Barco for updated firmware
Vendor Advisory: https://www.barco.com/en/support/software/R33050069?majorVersion=2&minorVersion=5&patchVersion=1&buildVersion=10
Restart Required: Yes
Instructions:
1. Contact Barco support for latest firmware. 2. Backup device configuration. 3. Upload new firmware via web interface. 4. Reboot device. 5. Verify firmware version.
🔧 Temporary Workarounds
Network Isolation
allPlace devices in isolated VLAN with strict firewall rules
SSH Access Restriction
linuxBlock SSH access from untrusted networks
iptables -A INPUT -p tcp --dport 22 -s TRUSTED_NETWORK -j ACCEPT
iptables -A INPUT -p tcp --dport 22 -j DROP
🧯 If You Can't Patch
- Immediately isolate affected devices in separate VLAN with strict firewall rules
- Disable SSH access entirely if not required for operations
🔍 How to Verify
Check if Vulnerable:
Check firmware version in web interface: Settings > About > Firmware Version
Check Version:
ssh root@device_ip 'cat /etc/version' (if SSH accessible)
Verify Fix Applied:
Verify firmware version is no longer in affected list and attempt SSH login with known hardcoded credentials fails
📡 Detection & Monitoring
Log Indicators:
- Failed SSH login attempts with root user
- Successful SSH logins from unusual IPs
- Configuration changes without authorized maintenance
Network Indicators:
- SSH connections to device from external IPs
- Unusual outbound connections from device
SIEM Query:
source="device_logs" (user="root" AND action="login") OR (port=22 AND dest_ip="device_ip")
🔗 References
- http://packetstormsecurity.com/files/160163/Barco-wePresent-Global-Hardcoded-Root-SSH-Password.html
- https://korelogic.com/Resources/Advisories/KL-001-2020-008.txt
- http://packetstormsecurity.com/files/160163/Barco-wePresent-Global-Hardcoded-Root-SSH-Password.html
- https://korelogic.com/Resources/Advisories/KL-001-2020-008.txt