CVE-2023-6259

7.1 HIGH

📋 TL;DR

This vulnerability in Brivo ACS100 and ACS300 access control systems allows attackers to bypass password recovery protections and gain unauthorized access. It enables exploitation of insufficient credential protection and improper access controls, potentially compromising physical security. Systems running firmware from version 5.2.4 up to (but not including) 6.2.4.3 are affected.

💻 Affected Systems

Products:
  • Brivo ACS100
  • Brivo ACS300
Versions: from 5.2.4 before 6.2.4.3
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All systems running affected firmware versions are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete physical security bypass allowing unauthorized entry to secured facilities, credential theft, and potential system takeover.

🟠

Likely Case

Unauthorized access to physical locations, credential compromise, and potential privilege escalation within the access control system.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, but physical security could still be compromised if systems are directly accessible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability involves password recovery exploitation which typically requires minimal technical skill to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.2.4.3

Vendor Advisory: https://support.brivo.com/l/en/article/g82txdwepa-brivo-firmware-release-notes#brivo_firmware_release_6_2_4_3

Restart Required: Yes

Instructions:

1. Download firmware version 6.2.4.3 from Brivo support portal. 2. Backup current configuration. 3. Upload and install the new firmware via the web interface. 4. Reboot the device. 5. Verify the firmware version after reboot.

🔧 Temporary Workarounds

Network Isolation

all

Isolate Brivo systems from untrusted networks and internet access to prevent remote exploitation.

Enhanced Monitoring

all

Implement strict monitoring of authentication and password recovery attempts on Brivo systems.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Brivo systems from untrusted networks
  • Enable detailed logging and monitoring for all authentication and password recovery attempts

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface: Login > System > About. If version is between 5.2.4 and 6.2.4.2 inclusive, system is vulnerable.

Check Version:

No CLI command available. Use web interface: System > About to view firmware version.

Verify Fix Applied:

After patching, verify firmware version shows 6.2.4.3 or higher in System > About page.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed password recovery attempts
  • Successful password recovery from unusual IP addresses
  • Authentication attempts from new or unexpected locations

Network Indicators:

  • Unusual network traffic to Brivo systems from external sources
  • Multiple HTTP requests to password recovery endpoints

SIEM Query:

source="brivo" AND (event_type="password_recovery" OR event_type="authentication") AND result="success" AND src_ip NOT IN [trusted_ips]

🔗 References

📤 Share & Export