Overview
Multiple models of Harman AMX multimedia devices contain a hard-coded debug account.
Description
| CWE-798: Use of Hard-coded Credentials - CVE-2015-8362 According to the researchers' blog post, several models of Harman AMX multimedia devices contain a hard-coded "backdoor" account with administrative permissions.  Further details are available in the researchers' vulnerability advisory.  AMX firmware release notes indicate this was a debugging account left in the released firmware. 
 Affected devices include but are not limited to: 
 | 
Impact
| An attacker with knowledge of the account credentials can obtain administrative access on the device. | 
Solution
| Apply an updateAMX has released an update for some devices. Affected users are encouraged to contact Harman's support line for more information on obtaining the update. | 
| Restrict network access | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | 10 | AV:N/AC:L/Au:N/C:C/I:C/A:C | 
| Temporal | 7.8 | E:POC/RL:OF/RC:C | 
| Environmental | 5.9 | CDP:ND/TD:M/CR:ND/IR:ND/AR:ND | 
References
- http://blog.sec-consult.com/2016/01/deliberately-hidden-backdoor-account-in.html
- http://www.amx.com/techcenter/NXSecurityBrief/
- http://www.amx.com/techcenter/firmware.asp?Category=Hot%20Fix%20Files
- http://seclists.org/fulldisclosure/2016/Jan/63
- https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20160121-0_AMX_Deliberately_hidden_backdoor_account_v10.txt
- http://www.amx.com/assets/whitePapers/AMX.AVIT.Administrators.Guide.pdf
Acknowledgements
Thanks to Johannes Greil of SEC Consult for reporting this vulnerability.
This document was written by Garret Wassermann.
Other Information
| CVE IDs: | CVE-2015-8362 | 
| Date Public: | 2016-01-21 | 
| Date First Published: | 2016-01-21 | 
| Date Last Updated: | 2016-01-27 23:50 UTC | 
| Document Revision: | 41 |