Ava-729 Camera vulnerable to resource exhaustion via the TPM
Release Date
31st of October 2023.
Overview
Due to insufficient rate limiting on the camera's TPM interface, an attacker could exhaust the device's CPU resources by initiating many TLS connections to HTTP APIs.
Affected Products
- Ava Cameras:
- All Stable upgrade channel versions before 5.8.3.
- All Beta upgrade channel versions before 5.8.0.
Unaffected Products
- Ava Aware: all versions.
- Ava Cameras:
- All Stable upgrade channel versions after and including 5.8.3.
- All Beta upgrade channel versions after and including 5.8.0.
- Ava Cloud: all versions.
Resolution
This issue has been fixed in Ava Camera Beta upgrade channel version 5.8.0 and Stable upgrade channel version 5.8.3.
It is highly recommended that all Ava Camera installations running an affected version upgrade to the latest release as soon as possible. Releases are available to download through the Ava Aware User Interface for Ava managed cameras and the Ava Camera User Interface for unmanaged Ava cameras.
Vulnerability Information
- CVE: pending
- CVSSv3 score: 7.5 (Medium)
- CVSSv3 vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Mitigations
There are no known mitigations for this issue.
Work arounds
There are no known work arounds for this issue.
Acknowledgements
Issue found internally by Ava Security.
Disclosure Timeline
- 25/11/2022 Issue found internally by Ava Security
- 09/02/2023 Root cause established
- 10/02/2023 Fix identified
- 05/04/2023 Patched Ava Cameras (Beta upgrade channel) released
- 04/05/2023 Patched Ava Cameras (Stable upgrade channel) released
- 31/10/2023 Vulnerability publicly disclosed