Ava-622: Last IP address used value in external viewers table could be spoofed
18th March 2022.
It was possible to craft an Ava Aware API request to set the last IP address used value in the table of external viewers to a user controlled value.
- Ava Aware:
- All Stable upgrade channel versions before 4.6.4.
- All Beta upgrade channel versions before 4.7.2.
- Ava Aware:
- All Stable upgrade channel versions after and including 4.6.4.
- All Beta upgrade channel versions after and including 4.7.2.
- Ava cameras: all versions.
- Ava Cloud: all versions.
This issue has been fixed in Ava Aware Beta upgrade channel version 4.7.2 and Stable upgrade channel version 4.6.4. It is strongly recommended that all installations running an affected version are upgraded to the latest release as soon as possible. Releases are available to download through the Ava Aware User Interface.
- CVE: pending
- CVSSv3 score: 4.3 (Medium)
- CVSSv3 vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
There are no known mitigations for this issue.
There are no known work arounds for this issue.
Issue found internally by Ava Security.
- 08/03/2022 Issue found internally by Ava Security
- 08/03/2022 Root cause established
- 08/03/2022 Fix identified
- 15/03/2022 Patched Ava Aware (Beta upgrade channel) released
- 15/03/2022 Preliminary vulnerability advisory published
- 16/03/2022 Patched Ava Aware (Stable upgrade channel) released
- 18/03/2022 Vulnerability publicly disclosed