An unauthenticated attacker could upload firmware files to HID Mercury controllers, triggering a reboot. Update to the latest firmware to mitigate the high-severity vulnerability.
An unauthenticated attacker could arbitrarily upload firmware files to the target device, ultimately causing a Denial-of-Service (DoS). This vulnerability impacts products based on HID Mercury Intelligent Controllers LP1501, LP1502, LP2500, LP4502, and EP4502 which contain firmware versions prior to 1.302 for the LP series and 1.296 for the EP series. The attacker needs to have a properly signed and encrypted binary, loading the firmware to the device ultimately triggers a reboot.
Understanding CVE-2022-31480
This section provides detailed insights into the vulnerability and its implications.
What is CVE-2022-31480?
CVE-2022-31480 allows unauthenticated attackers to upload firmware files to vulnerable devices, leading to a Denial-of-Service (DoS) condition.
The Impact of CVE-2022-31480
The vulnerability can be exploited by an attacker to trigger a reboot of the affected device, disrupting its normal operation and potentially causing service interruptions.
Technical Details of CVE-2022-31480
Explore the technical aspects of the CVE, including the vulnerability description, affected systems, and exploitation mechanism.
Vulnerability Description
The vulnerability enables unauthenticated upload of firmware files, potentially resulting in a DoS condition on the targeted device.
Affected Systems and Versions
Products by HID Mercury and LenelS2 are impacted, including LP1501, LP1502, LP2500, LP4502, EP4502, LNL-X2210, LNL-X2220, LNL-X3300, LNL-X4420, LNL-4420, S2-LP-1501, S2-LP-1502, S2-LP-2500, and S2-LP-4502 with specific firmware versions.
Exploitation Mechanism
The attacker must possess a properly signed and encrypted binary to upload firmware files to the device, which causes a reboot upon successful loading.
Mitigation and Prevention
Learn how to address and prevent CVE-2022-31480 effectively.
Immediate Steps to Take
Disable the controller's Web Server as a temporary workaround to mitigate the risk until a permanent solution is implemented.
Long-Term Security Practices
Regularly update firmware to the latest version, apply security patches promptly, and follow cybersecurity best practices to enhance overall system security.
Patching and Updates
Ensure that all affected devices are updated to the latest firmware version containing security fixes and enhancements.