vendor:
Lifesize Room
by:
XiphosResearch
8,8
CVSS
HIGH
Remote config disclosure, code execution & local privilege escalation
78
CWE
Product Name: Lifesize Room
Affected Version From: 5.0.9
Affected Version To: 5.0.9
Patch Exists: No
Related CWE: N/A
CPE: a:lifesize:lifesize_room
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2020
LifeSize Room 5.0.9, remote config disclosure, code execution & local privilege escalation
This exploit uses the LsSystemRestore.sh script to disclose the current configuration, that is then leveraged to gain access to exploitable APIs in the admin portal which allow arbitrary command injection, then uses a local privilege escalation bug to execute the payload as root. This will work as long as port 443 is open on the phone, Lifesize support should recommend that the power and ethernet cables are disconnected from the device to ensure it remains secure.
Mitigation:
Disconnect the power and ethernet cables from the device to ensure it remains secure.