CVE-2022-26671

7.3 HIGH

📋 TL;DR

Taiwan Secom Dr.ID Access Control system's login page contains hard-coded credentials in source code, allowing unauthenticated remote attackers to access partial system information and modify settings to disrupt service. This affects all deployments of the vulnerable Dr.ID Access Control system.

💻 Affected Systems

Products:
  • Taiwan Secom Dr.ID Access Control System
Versions: Specific versions not disclosed in available references, but all versions with the vulnerable login page implementation.
Operating Systems: Unknown - Likely runs on embedded or custom OS
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default login page implementation with hard-coded credentials in source code.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to modify access control settings, disable security features, and potentially gain administrative privileges over physical access systems.

🟠

Likely Case

Unauthenticated attackers accessing sensitive system information and modifying configuration settings to cause service disruption or bypass security controls.

🟢

If Mitigated

Limited information disclosure with no ability to modify critical settings if proper network segmentation and access controls are implemented.

🌐 Internet-Facing: HIGH - The vulnerability is in a login page that is typically internet-facing for remote access, and exploitation requires no authentication.
🏢 Internal Only: MEDIUM - Even internally, the hard-coded credentials could be discovered and exploited by malicious insiders or compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only discovering the hard-coded credentials from source code and using them to authenticate.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in available references

Vendor Advisory: https://www.twcert.org.tw/tw/cp-132-5971-b691f-1.html

Restart Required: Yes

Instructions:

1. Contact Taiwan Secom for updated firmware/software. 2. Apply vendor-provided patch. 3. Restart the Dr.ID Access Control system. 4. Verify hard-coded credentials are removed from source code.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Dr.ID Access Control system from untrusted networks and internet access.

Access Control Lists

all

Implement strict firewall rules to limit access to Dr.ID system only from authorized IP addresses.

🧯 If You Can't Patch

  • Implement network segmentation to isolate the system from untrusted networks
  • Monitor authentication logs for use of hard-coded credentials and implement alerting

🔍 How to Verify

Check if Vulnerable:

Inspect the login page source code for hard-coded credentials or attempt authentication with discovered hard-coded credentials.

Check Version:

Check system administration interface or contact vendor for version information.

Verify Fix Applied:

Verify hard-coded credentials are no longer present in source code and test authentication with previously known credentials fails.

📡 Detection & Monitoring

Log Indicators:

  • Authentication attempts using hard-coded credentials
  • Unauthorized configuration changes
  • Multiple failed login attempts followed by successful authentication

Network Indicators:

  • Unusual authentication traffic to Dr.ID system from unexpected sources
  • Configuration change requests from unauthenticated sources

SIEM Query:

source="dr.id" AND (event_type="authentication" AND result="success" AND user="[hard-coded-username]") OR (event_type="configuration_change" AND source_ip NOT IN [authorized_ips])

🔗 References

📤 Share & Export