CVE-2022-30620

8.2 HIGH

📋 TL;DR

This vulnerability allows attackers with web access to Cellinx cameras to elevate privileges from guest (1) to administrator (0) by manipulating cookie values. Attackers can gain administrative control over camera configurations. This affects Cellinx cameras with guest access enabled.

💻 Affected Systems

Products:
  • Cellinx Camera
Versions: Specific versions not specified in CVE, but all versions with guest access feature enabled are likely affected.
Operating Systems: Embedded camera firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires guest access to be enabled on the camera. The vulnerability is in the web interface authentication mechanism.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete camera compromise allowing configuration changes, firmware modification, disabling security features, and potential use as network pivot point.

🟠

Likely Case

Unauthorized administrative access leading to camera configuration changes, surveillance disruption, or credential harvesting.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external access to camera web interfaces.

🌐 Internet-Facing: HIGH - Cameras exposed to internet are directly vulnerable to remote privilege escalation.
🏢 Internal Only: MEDIUM - Requires internal network access but provides administrative control once accessed.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires web access to camera interface but is simple cookie manipulation. No authentication bypass needed if guest access is enabled.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: https://www.gov.il/en/departments/faq/cve_advisories

Restart Required: No

Instructions:

Check vendor advisory for firmware updates. If no patch available, implement workarounds immediately.

🔧 Temporary Workarounds

Disable Guest Access

all

Disable guest user functionality on Cellinx cameras to prevent exploitation.

Access camera web interface > Security settings > Disable guest user account

Network Segmentation

all

Isolate cameras on separate VLAN with restricted access to management interfaces.

Configure firewall rules to block external access to camera web ports (typically 80/443)

🧯 If You Can't Patch

  • Disable guest access on all cameras immediately
  • Implement strict network access controls to camera management interfaces
  • Monitor for unauthorized configuration changes

🔍 How to Verify

Check if Vulnerable:

Check if guest access is enabled on camera web interface and test cookie manipulation of is_admin/showConfig values.

Check Version:

Check firmware version in camera web interface under System Information

Verify Fix Applied:

Verify guest access is disabled and cookie manipulation no longer grants administrative privileges.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful admin access
  • Configuration changes from non-admin IP addresses
  • Cookie manipulation attempts in web logs

Network Indicators:

  • Unusual HTTP requests to camera web interface with modified cookie values
  • Traffic to camera management ports from unauthorized sources

SIEM Query:

source="camera_web_logs" AND (cookie="is_admin=0" OR cookie="showConfig=0") AND user_agent!="admin_browser"

🔗 References

📤 Share & Export