CVE-2020-35338

9.8 CRITICAL

📋 TL;DR

CVE-2020-35338 is a critical authentication bypass vulnerability in Mobile Viewpoint WMT Playout Server's web administrative interface. It allows attackers to gain administrative access using default credentials (username: unknown, password: 'pokon'). This affects organizations using Mobile Viewpoint WMT Playout Server version 20.2.8 and earlier.

💻 Affected Systems

Products:
  • Mobile Viewpoint Wireless Multiplex Terminal (WMT) Playout Server
Versions: 20.2.8 and earlier
Operating Systems: Unknown - likely embedded/Linux based
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration with hardcoded default password.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the playout server allowing attackers to disrupt broadcast operations, inject malicious content, or pivot to internal networks.

🟠

Likely Case

Unauthorized administrative access leading to configuration changes, service disruption, or data exfiltration.

🟢

If Mitigated

Limited impact if strong network segmentation and monitoring are in place, though authentication bypass remains possible.

🌐 Internet-Facing: HIGH - Web administrative interface exposed to internet allows remote attackers to gain administrative control.
🏢 Internal Only: HIGH - Even internally, attackers with network access can exploit this default credential vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple credential-based attack requiring only web access to administrative interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 20.2.8

Vendor Advisory: https://www.mobileviewpoint.com/

Restart Required: Yes

Instructions:

1. Contact Mobile Viewpoint for updated firmware. 2. Backup current configuration. 3. Apply firmware update. 4. Change all default credentials. 5. Restart system.

🔧 Temporary Workarounds

Change Default Password

all

Immediately change the default 'pokon' password to a strong, unique password.

Access web interface > Administration > Change Password

Network Segmentation

linux

Restrict access to administrative interface using firewall rules.

iptables -A INPUT -p tcp --dport [admin_port] -s [trusted_ips] -j ACCEPT
iptables -A INPUT -p tcp --dport [admin_port] -j DROP

🧯 If You Can't Patch

  • Immediately change all default credentials to strong, unique passwords
  • Implement strict network access controls to limit administrative interface access to trusted IPs only

🔍 How to Verify

Check if Vulnerable:

Attempt to login to web administrative interface using default credentials (password: 'pokon'). If successful, system is vulnerable.

Check Version:

Check web interface login page or system information page for version number

Verify Fix Applied:

Verify default credentials no longer work and check system version is above 20.2.8.

📡 Detection & Monitoring

Log Indicators:

  • Failed login attempts followed by successful login with default credentials
  • Multiple login attempts from unusual IP addresses

Network Indicators:

  • HTTP POST requests to login endpoint with 'pokon' password
  • Unusual administrative access from non-standard IPs

SIEM Query:

source="web_logs" AND (password="pokon" OR failed_login>5)

🔗 References

📤 Share & Export