7th September 2021.
Due to a recent "secure by design" architecture change of all Ava Camera. The decision was made to move from static passwords to daily rotating passwords controlled by the Ava Cloud VMS. During this change and code review it was discovered that the Camera API did not enforce password strength server side however, client side checks were enforced when using the API via the camera WebGUI interface.
- Ava Cameras:
- All Stable upgrade Channel versions before 4.0.4.
- All Beta upgrade channel versions before 4.1.0.
- Ava Aware:
- All Stable upgrade channel all versions.
- All Beta upgrade channel all versions.
- Ava Cameras:
- All Stable upgrade channel versions after and including 4.0.4.
- All Beta upgrade channel versions after and including 4.1.0.
- Ava Cloud: all versions
This issue has been fixed in Ava Camera Beta upgrade channel version 4.1.0 and Stable upgrade channel version 4.0.4.
It is highly recommended that all that all Ava Camera installations running an affected version upgrade to the latest release as soon as possible. Releases are available to download through the Ava Aware User Interface for Ava managed cameras and the Ava Camera User Interface for unmanaged Ava cameras.
- CVE: pending
- CVSSv3 score: 7.2 (High)
- CVSSv3 vector: 3.1#CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
There are no known mitigations for this issue.
There are no known work arounds for this issue.
Issue found internally by Ava Security.
- 23/07/2021 Issue found internally by Ava Security
- 23/07/2021 Root cause established
- 23/07/2021 Fix identified
- 28/07/2021 Patched Ava Cameras (Beta upgrade channel) released
- 29/07/2021 Patched Ava Cameras (Stable upgrade channel) released
- 07/09/2021 Vulnerability publicly disclosed