Overview
S2 NetBox and related products do not adequately restrict access to node logs, backups, and employee photographs. A remote, unauthenticated attacker could use information obtained from a vulnerable system to aid in further attacks.
Description
| S2 NetBox is a line of "...open architecture, scalable, IP network-ready products for the physical security industry that integrate access control, alarm monitoring, video surveillance, and temperature monitoring." S2 Netbox systems are operated entirely via a web interface. The Netbox web server does not properly authenticate access to several directories, allowing an unauthenticated attacker to access network node logs, employee photographs, and backup archives. | 
Impact
| An unauthenticated, remote attacker can access node logs, backups, and employee photographs. An attacker may be able to crack passwords contained in a backup and gain administrative control over the system. Node logs and employee photographs could provide an attacker with reconnaissance information. | 
Solution
| Upgrade or patch | 
| 
 | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental | 
References
Acknowledgements
These vulnerabilities were researched and reported by Shawn Merdinger. Thanks to S2 Security for information used in this document.
This document was written by Art Manion.
Other Information
| CVE IDs: | CVE-2010-2466 | 
| Severity Metric: | 2.63 | 
| Date Public: | 2010-06-24 | 
| Date First Published: | 2010-06-24 | 
| Date Last Updated: | 2010-07-09 20:56 UTC | 
| Document Revision: | 32 |