SRC-2016-0034 : Samsung Security Manager Apache Felix Gogo Remote Code Execution Vulnerability
Samsung Security Manager
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Samsung Security Manager. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the Apache Felix Gogo runtime that is installed as part of this product. By issuing an HTTP POST request, an attacker can execute arbitray commands. An attacker can further leverage this vulnerability to execute code on the server as SYSTEM.
Samsung has not issued an update to correct this vulnerability.
- 2016-07-25 – Vulnerability reported to vendor & ICS-CERT
- 2016-07-27 – The vendor responded with status that they cannot reproduce any of the issues
- 2016-07-28 - Resent the initial reports and explained in depth the vulnerabilities
- 2016-07-31 - The vendor responded again with "Nothing is happened" after running multiple PoC exploits
- 2016-08-08 - Requested the help of ICS-CERT in dealing with the vendor
- 2016-08-08 - The vendor stated they have forwarded the information on to one of their developers
- 2016-08-18 - No response from the vendor or ICS-CERT
- 2016-08-21 - Reminder email sent to the vendor that Source Incite intends to release as zero-day
- 2016-08-22 - The release of this zero-day advisory
Proof of Concept:
This vulnerability was discovered by Steven Seeley of Source Incite
Source Incite would like to acknowledge ICS-CERT for the help with co-ordination of this vulnerability.