CVE-2016-15046
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-25

Last updated on: 2025-07-30

Assigner: VulnCheck

Description
A client-side remote code execution vulnerability exists in Hanwha Techwin Smart Security Manager (SSM) versions 1.32 and 1.4, due to improper restrictions on the PUT method exposed by the bundled Apache ActiveMQ instance (running on port 8161). An attacker can exploit this flaw through a Cross-Origin Resource Sharing (CORS) bypass combined with JavaScript-triggered file uploads to the web server, ultimately resulting in arbitrary code execution with SYSTEM privileges. This vulnerability bypasses the server-side mitigations introduced in ZDI-15-156 and ZDI-16-481 by shifting the exploitation to the client-side. This product is now referred to asΒ Hanwha Wisenet SSM and it is unknown if current versions are affected.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-25
Last Modified
2025-07-30
Generated
2026-05-06
AI Q&A
2025-07-25
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
samsung security_manager 1.4
samsung security_manager 1.32
apache activemq *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-306 The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
CWE-434 The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2016-15046 is a remote code execution vulnerability in Samsung Security Manager versions 1.32 and 1.4. It arises from improper restrictions on the HTTP PUT method exposed by the bundled Apache ActiveMQ service running on port 8161. An attacker can exploit this by bypassing Cross-Origin Resource Sharing (CORS) protections combined with JavaScript-triggered file uploads, allowing them to upload malicious files to the server. This leads to arbitrary code execution with SYSTEM-level privileges on the affected server. The attack involves a client-side component that bypasses previous server-side mitigations, using techniques such as cross-site scripting (XSS), path traversal, and crafted HTTP requests to achieve full system compromise. [1, 2, 3, 5]


How can this vulnerability impact me? :

This vulnerability can lead to a complete system compromise of the affected Samsung Security Manager installations. An attacker can execute arbitrary code with SYSTEM privileges remotely, which means they can take full control over the server, access sensitive data, disrupt services, or use the compromised system as a foothold for further attacks. Exploitation requires user interaction, such as visiting a malicious webpage, but no authentication or privileges are needed. The impact includes full loss of confidentiality, integrity, and availability of the system. [1, 2, 3, 4, 5]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability can involve monitoring for unusual HTTP PUT requests to the ActiveMQ web interface on port 8161, especially those attempting to upload files with path traversal sequences (e.g., '..\\admin\\'). Network intrusion detection systems (NIDS) or web application firewalls (WAF) can be configured to alert on such suspicious PUT requests. Additionally, using the Metasploit module for CVE-2016-15046 can help verify if the system is vulnerable by attempting a controlled exploit. Commands to check open ports and services include: 'netstat -an | grep 8161' to verify if the ActiveMQ service is running on port 8161, and 'curl -v -X PUT http://<target>:8161/' with crafted payloads to test for unrestricted file upload. Monitoring logs for HTTP PUT requests and unusual file creations in the ActiveMQ directories can also aid detection. [2, 5]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include applying the official security updates released by Samsung to fix the ActiveMQ PUT method vulnerability. If updates are not immediately available, restrict access to the ActiveMQ web interface on port 8161 by firewall rules to limit it to trusted administrators only. Disable or restrict the HTTP PUT method on the ActiveMQ service if possible. Employ network intrusion prevention systems (IPS) or filters such as Trend Micro TippingPoint Digital Vaccine filter ID 16228 to block exploit attempts. Additionally, monitor and block suspicious HTTP PUT requests and consider disabling the ActiveMQ web console if it is not required. [3, 4]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart