CVE-2016-15046

A client-side remote code execution vulnerability exists in Hanwha Techwin Smart Security Manager (SSM) versions 1.32 and 1.4, due to improper restrictions on the PUT method exposed by the bundled Apache ActiveMQ instance (running on port 8161). An attacker can exploit this flaw through a Cross-Origin Resource Sharing (CORS) bypass combined with JavaScript-triggered file uploads to the web server, ultimately resulting in arbitrary code execution with SYSTEM privileges. This vulnerability bypasses the server-side mitigations introduced in ZDI-15-156 and ZDI-16-481 by shifting the exploitation to the client-side. This product is now referred to as Hanwha Wisenet SSM and it is unknown if current versions are affected.
CVSS

No CVSS.

Configurations

No configuration.

History

30 Jul 2025, 16:15

Type Values Removed Values Added
References () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/browser/samsung_security_manager_put.rb - () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/browser/samsung_security_manager_put.rb -

30 Jul 2025, 14:15

Type Values Removed Values Added
Summary (en) A client-side remote code execution vulnerability exists in Hanwha Techwin SSM (Samsung Security Manager) versions 1.32 and 1.4, due to improper restrictions on the PUT method exposed by the bundled Apache ActiveMQ instance (running on port 8161). An attacker can exploit this flaw through a Cross-Origin Resource Sharing (CORS) bypass combined with JavaScript-triggered file uploads to the web server, ultimately resulting in arbitrary code execution with SYSTEM privileges. This vulnerability bypasses the server-side mitigations introduced in ZDI-15-156 and ZDI-16-481 by shifting the exploitation to the client-side. This product is now referred to as Hanwha Wisenet SSM and it is unknown if current versions are affected. (en) A client-side remote code execution vulnerability exists in Hanwha Techwin Smart Security Manager (SSM) versions 1.32 and 1.4, due to improper restrictions on the PUT method exposed by the bundled Apache ActiveMQ instance (running on port 8161). An attacker can exploit this flaw through a Cross-Origin Resource Sharing (CORS) bypass combined with JavaScript-triggered file uploads to the web server, ultimately resulting in arbitrary code execution with SYSTEM privileges. This vulnerability bypasses the server-side mitigations introduced in ZDI-15-156 and ZDI-16-481 by shifting the exploitation to the client-side. This product is now referred to as Hanwha Wisenet SSM and it is unknown if current versions are affected.

29 Jul 2025, 16:15

Type Values Removed Values Added
Summary (en) A client-side remote code execution vulnerability exists in Samsung Security Manager versions 1.32 and 1.4, due to improper restrictions on the PUT method exposed by the bundled Apache ActiveMQ instance (running on port 8161). An attacker can exploit this flaw through a Cross-Origin Resource Sharing (CORS) bypass combined with JavaScript-triggered file uploads to the web server, ultimately resulting in arbitrary code execution with SYSTEM privileges. This vulnerability bypasses the server-side mitigations introduced in ZDI-15-156 and ZDI-16-481 by shifting the exploitation to the client-side. This product is now known as Hanwha Wisenet SSM and it is unknown if current versions are affected. (en) A client-side remote code execution vulnerability exists in Hanwha Techwin SSM (Samsung Security Manager) versions 1.32 and 1.4, due to improper restrictions on the PUT method exposed by the bundled Apache ActiveMQ instance (running on port 8161). An attacker can exploit this flaw through a Cross-Origin Resource Sharing (CORS) bypass combined with JavaScript-triggered file uploads to the web server, ultimately resulting in arbitrary code execution with SYSTEM privileges. This vulnerability bypasses the server-side mitigations introduced in ZDI-15-156 and ZDI-16-481 by shifting the exploitation to the client-side. This product is now referred to as Hanwha Wisenet SSM and it is unknown if current versions are affected.

29 Jul 2025, 14:14

Type Values Removed Values Added
Summary
  • (es) Existe una vulnerabilidad de ejecución remota de código en el lado del cliente en las versiones 1.32 y 1.4 de Samsung Security Manager, debido a restricciones indebidas en el método PUT, expuestas por la instancia de Apache ActiveMQ incluida (que se ejecuta en el puerto 8161). Un atacante puede explotar esta vulnerabilidad mediante Cross-Origin Resource Sharing (CORS) combinada con la carga de archivos al servidor web mediante JavaScript, lo que resulta en la ejecución de código arbitrario con privilegios SYSTEM. Esta vulnerabilidad elude las mitigaciones del lado del servidor introducidas en ZDI-15-156 y ZDI-16-481 al trasladar la explotación al lado del cliente. Este producto se conoce ahora como Hanwha Wisenet SSM y se desconoce si las versiones actuales están afectadas.

25 Jul 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-25 16:15

Updated : 2025-07-30 16:15


NVD link : CVE-2016-15046

Mitre link : CVE-2016-15046

CVE.ORG link : CVE-2016-15046


JSON object : View

Products Affected

No product.

CWE
CWE-306

Missing Authentication for Critical Function

CWE-434

Unrestricted Upload of File with Dangerous Type