Alta Video —1532: Endpoint exposed internal camera details via external links
Release Date
4th of March 2025.
Overview
A vulnerability allowed unauthorized access to sensitive device information via the external links feature. The flaw exposed internal details including serial numbers, potentially wifi credentials, and potentially passwords. This information was revealed through GET API calls to the api/v1/sites endpoint.
Affected Products
- Alta Video:
- All Stable upgrade channel versions before 7.3.7.
- All Beta upgrade channel versions before 7.3.0.
Unaffected Products
- Alta Video:
- All Stable upgrade channel versions after and including 7.3.7.
- All Beta upgrade channel versions after and including 7.3.0.
- Avigilon Cloud-Native Cameras: all versions.
- Alta Video Cloud: all versions.
Resolution
This issue has been fixed in Alta Video Beta upgrade channel version 7.3.0 and Stable upgrade channel version 7.3.7.
It is highly recommended that all installations running an affected version are upgraded to the latest release as soon as possible. Releases are available to download through the Alta Video User Interface.
Vulnerability Information
- CVSSv3 score: 7.5 (High)
- CVSSv3 vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Mitigations
There are no known mitigations for this issue.
Work arounds
There are no known work arounds for this issue.
Acknowledgements
Issue found internally by Alta Video.
Disclosure Timeline
- 07/06/2024 Issue found
- 09/09/2024 Root cause established
- 11/09/2024 Fix identified
- 04/03/2024 Vulnerability publicly disclosed