Vigil@nce - ICONICS GENESIS32: privilege elevation via Security Configurator
August 2012 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
A local attacker can use a vulnerability of ICONICS GENESIS32 and
BizViz applications, in order to elevate his privileges.
Severity: 2/4
Creation date: 31/07/2012
IMPACTED PRODUCTS
– ICONICS GENESIS32
DESCRIPTION OF THE VULNERABILITY
The access to ICONICS GENESIS32/BizViz requires a user account.
When an account is locked, it cannot be used to log in. A
challenge-response operation is then required to enable the
account. However, an attacker can bypass the challenge, and then
log in on Security Configurator as an administrator.
A local attacker can therefore use a vulnerability of ICONICS
GENESIS32 and BizViz applications, in order to elevate his
privileges.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN