SOYAL Biometric Access Control System 5.0 Weak Default Credentials

Title: SOYAL Biometric Access Control System 5.0 Weak Default Credentials
Advisory ID: ZSL-2021-5631
Type: Local/Remote
Impact: System Access
Risk: (4/5)
Release Date: 18.03.2021
Summary
Soyal Access systems are built into Raytel Door Entry Systems and are providing access and lift control to many buildings from public and private apartment blocks to prestigious public buildings.
Description
The web control panel uses weak set of default administrative credentials (no password) that can be easily guessed in remote password attacks.
Vendor
SOYAL Technology Co., Ltd - https://www.soyal.com
Affected Version
AR-727 i/CM - F/W: 5.0
AR837E/EF - F/W: 4.3
AR725Ev2 - F/W: 4.3 191231
AR331/725E - F/W: 4.2
AR837E/EF - F/W: 4.1
AR-727CM /i - F/W: 4.09
AR-727CM /i - F/W: 4.06
AR-837E - F/W: 3.03
Tested On
SOYAL Technology WebServer 2.0
SOYAL Serial Device Server 4.03A
SOYAL Serial Device Server 4.01n
SOYAL Serial Device Server 3.07n
Vendor Status
[25.01.2021] Vulnerability discovered.
[03.02.2021] Vendor contacted.
[08.02.2021] No response from the vendor.
[09.02.2021] Distributor responds and informs vendor.
[09.02.2021] Sent details to distributor.
[10.02.2021] Asked distributor for status update.
[11.02.2021] Vendor will patch the issue.
[18.03.2021] Public security advisory released.
PoC
soyal_creds.txt
Credits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>
References
[1] https://exchange.xforce.ibmcloud.com/vulnerabilities/198553
[2] https://packetstormsecurity.com/files/161875/
[3] https://cxsecurity.com/issue/WLB-2021030119
[4] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28266
[5] https://nvd.nist.gov/vuln/detail/CVE-2021-28266
Changelog
[18.03.2021] - Initial release
[23.03.2021] - Added reference [1], [2] and [3]
[19.06.2021] - Added reference [4] and [5]
Contact
Zero Science Lab

Web: https://www.zeroscience.mk
e-mail: lab@zeroscience.mk