GeoVision ASManager Windows Application 6.1.2.0 Credentials Disclosure
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读用户提供的文章内容,了解主要信息。 文章标题是关于GeoVision ASManager Windows应用的漏洞,版本6.1.2.0或更低。漏洞类型是凭据泄露,由Giorgi Dograshvili发现。影响方面,攻击者可以获取系统级访问权限,进而访问监控摄像头、员工信息等资源,并进行配置更改和破坏服务。 接下来,我需要提取关键点:软件名称、版本、漏洞类型、攻击者权限、影响范围。然后用简洁的语言把这些点整合起来,确保不超过100字。 可能会遇到的问题是如何在有限的字数内涵盖所有重要信息。我需要选择最核心的内容,比如漏洞导致凭据泄露、攻击者权限和可能的影响。 最后,检查总结是否准确且简洁,确保没有遗漏关键信息。 </think> GeoVision ASManager Windows应用(6.1.2.0或更低)存在凭据泄露漏洞,攻击者可通过内存处理不当获取系统级访问权限,进而控制监控摄像头、员工数据等资源并进行配置更改。 2025-10-29 20:23:28 Author: cxsecurity.com(查看原文) 阅读量:9 收藏

GeoVision ASManager Windows Application 6.1.2.0 Credentials Disclosure

# Exploit Title: GeoVision ASManager Windows Application 6.1.2.0 - Credentials Disclosure # Date: 19-MAR-2025 # Exploit Author: Giorgi Dograshvili [DRAGOWN] # Vendor Homepage: https://www.geovision.com.tw/ # Software Link: https://www.geovision.com.tw/download/product/ # Version: 6.1.2.0 or less # Tested on: Windows 10 | Kali Linux # CVE : CVE-2025-26263 # PoC: https://github.com/DRAGOWN/CVE-2025-26263 GeoVision ASManager Windows desktop application with the version 6.1.2.0 or less, is vulnerable to credentials disclosure due to improper memory handling in the ASManagerService.exe process. Requirements To perform successful attack an attacker requires: - System level access to the GV-ASManager windows desktop application with the version 6.1.2.0 or less; - A high privilege account to dump the memory. Impact The vulnerability can be leveraged to perform the following unauthorized actions: - An attacker with high privilege system user, who isn't authorized to access GeoVision ASManager, is able to: -- Dump ASManager accounts credentials; -- Authenticate in ASManager. - After the authenticating in ASManager, an attacker will be able to: -- Access the resources such as monitoring cameras, access cards, parking cars, employees and visitors, etc. -- Make changes in data and service network configurations such as employees, access card security information, IP addresses and configurations, etc. -- Disrupt and disconnect services such as monitoring cameras, access controls. -- Clone and duplicate access control data for further attack scenarios. PoC The steps for a successful exploitation are described in the following GitHub article with screenshots: - https://github.com/DRAGOWN/CVE-2025-26263 After a successful attack, you will get administrative access to: - ASManager - Access & Security Management software in OS - ASWeb - Access & Security Management - TAWeb - Time and Attendance Management - VMWeb - Visitor Management



 

Thanks for you comment!
Your message is in quarantine 48 hours.

{{ x.nick }}

|

Date:

{{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1


{{ x.comment }}


文章来源: https://cxsecurity.com/issue/WLB-2025100016
如有侵权请联系:admin#unsafe.sh