Popular Visitor Management Systems exposed due to security bugs
- A total of 19 security vulnerabilities were discovered in five leading visitor management systems.
- The systems are Jolly Technologies' Lobby Track Desktop, HID Global's EasyLobby Solo, Threshold Security's eVisitorPass, Envoy's Envoy Passport, and The Receptionist.
Visitor Management Systems (VMS) are a norm in most private or public buildings. They play an essential role in the physical security of the premises of any organization. However, in a recent study, security researchers from IBM’s X-Force Red uncovered a string of security flaws present in visitor management systems(VMS).
X-Force Red is the penetration testing team of IBM. The research revealed vulnerabilities ranging from data exfiltration to complete system takeover by external entities.
What are the vulnerabilities?
The following are the vulnerabilities with the CVE number and a short description.
- CVE-2018-17482 - Lobby Track Desktop visitor records information disclosure.
- CVE-2018-17483 - Lobby Track Desktop driver’s license number information disclosure.
- CVE-2018-17484 - Lobby Track Desktop database information disclosure.
- CVE-2018-17485 - Lobby Track Desktop default account.
- CVE-2018-17486 - Lobby Track Desktop visitor records security bypass.
- CVE-2018-17487 - Lobby Track Desktop kiosk breakout privilege escalation.
- CVE-2018-17488 - Lobby Track Desktop kiosk breakout privilege escalation.
- CVE-2018-17489 - EasyLobby Solo social security number information disclosure.
- CVE-2018-17490 - EasyLobby Solo task manager denial of service.
- CVE-2018-17491 - EasyLobby Solo program privilege escalation.
- CVE-2018-17492 - EasyLobby Solo default account.
- CVE-2018-17493 - eVisitorPass Fullscreen button breakout privilege escalation.
- CVE-2018-17494 - eVisitorPass Start Menu breakout privilege escalation.
- CVE-2018-17495 - eVisitorPass Help Dialog privilege escalation.
- CVE-2018-17496 - eVisitorPass kiosk privilege escalation.
- CVE-2018-17497 - eVisitorPass admin credentials default account.
- CVE-2018-17499 - Envoy Passport for Android and Envoy Passport for iPhone API key information disclosure.
- CVE-2018-17500 - Envoy Passport for Android and Envoy Passport for iPhone OAuth Creds information disclosure.
- CVE-2018-17502 - The Receptionist for iPad contacts information disclosure.
The methodology behind the research
Daniel Crowley, research director of IBM X-Force Red told ThreatPost about the methodology used by the researchers to analyze VMS.
“One, was how easy it is to get checked-in as a visitor without any sort of real identifying information. Secondly, we set out to see how easy is it to get other people’s information out of the system. And third, is there a way that an adversary can break out of the application, cause it to crash or get arbitrary code-execution to run on the targeted device and gain a foothold to attack the corporate network,” said Crowley.
Following the disclosure, the researchers have notified the respective VMS providers of these flaws.