Sploit.io - Search

Product: Q Plus, version: 1.9.0.3_278

CVE-2021-31505

Severity: Unknown

Description: This vulnerability allows attackers with physical access to escalate privileges on affected installations of Arlo Q Plus 1.9.0.3_278. Authentication is not required to exploit this vulnerability. The specific flaw exists within the SSH service. The device can be booted into a special operation mode where hard-coded credentials are accepted for SSH authentication. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-12890.

CVSS Score: N/A

Priority

D

CISA Data

EPSS Data

  • EPSS: 0.003140000
  • Percentile: 0.542420000
  • Date: 2026-03-18

ExploitDB

No data available.

HackerOne Data

  • Rank: 8927
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • Arlo Q Plus - Versions: 1.9.0.3_278

    References:

    Risk Assessment

    1. Risk Assessment

    The vulnerability, CVE-2021-31505, centers around hard-coded credentials within the SSH service of the Arlo Q Plus camera (version 1.9.0.3_278). This allows an attacker with physical access to escalate privileges to root without needing to authenticate. The nature of the vulnerability is a classic case of weak credential management. The business impact could range from moderate to significant, depending on the sensitivity of the data the camera has access to and the environment it’s deployed in. For example, a camera in a home environment may have lower impact than one in a corporate office observing sensitive operations.

    The likelihood of exploitation is relatively high, given the physical access requirement is the primary hurdle. The ease of exploitation is also high; once physical access is gained, the special operation mode and hard-coded credentials make privilege escalation straightforward. Impacts to confidentiality are high, as an attacker with root access can potentially access all data the camera has access to, including video feeds and potentially associated network traffic. Integrity is also high, as the attacker can modify the camera's configuration and even potentially inject malicious code. Availability is also high, as a compromised camera could be disabled or used to disrupt services. The CVSS v3 score of 6.8 (Medium) reflects this overall risk level.

    2. Potential Attack Scenarios

    An attacker gains physical access to an Arlo Q Plus camera deployed in an office environment. They reboot the camera into the special operation mode, as detailed in the Arlo security advisory. Using the hard-coded credentials, they SSH into the camera as root. Once logged in, they can access the camera’s file system, view recorded video footage, potentially access network configurations, and even modify firmware. The attacker could then exfiltrate sensitive video data, or use the camera as a foothold to pivot into the wider network if the camera is on the same network segment. This could lead to compromise of other systems and data.

    3. Mitigation Recommendations

    The primary mitigation is to update the Arlo Q Plus camera to a version that addresses this vulnerability. Arlo has released a firmware update to resolve the hard-coded credential issue. Check the Arlo website or app for the latest firmware version and apply the update.

    Immediate Actions:
    * Patch to the latest firmware: https://kb.arlo.com/000062592/Security-Advisory-for-Arlo-Q-Plus-SSH-Use-of-Hard-coded-Credentials-Allowing-Privilege-Escalation
    * Limit Physical Access: Restrict physical access to the Arlo Q Plus cameras as much as possible, particularly in sensitive environments.
    * Network Segmentation: Segment the network to limit the impact of a compromised camera.

    Longer Term Actions:
    * Regularly review firmware updates for all Arlo devices.
    * Consider network monitoring to detect unusual SSH activity from the camera.

    4. Executive Summary

    The Arlo Q Plus camera (version 1.9.0.3_278) is vulnerable to a privilege escalation attack due to the use of hard-coded SSH credentials. An attacker with physical access can gain root access to the camera without authentication. This could allow them to steal video footage, modify the camera's configuration, or use the camera as a stepping stone to compromise the broader network.

    The risk is considered medium, but the potential impact on confidentiality, integrity, and availability could be significant. We recommend immediately patching the Arlo Q Plus camera to the latest firmware version to resolve this vulnerability. Limiting physical access to the cameras and segmenting the network can further reduce the risk. Addressing this vulnerability is important to protect sensitive data and maintain the integrity of our surveillance systems. Prompt action is recommended to minimize potential business impact.