Skip to main content

Critical vulnerability in RabbitMQ affecting Genetec products

November 17, 2022

A critical vulnerability was discovered in the RabbitMQ message broker, a third-party component used by some Genetec products to communicate together.

As a consequence, some versions of Mission Control, Sipelia, Industrial IoT plugin, Airport Operational Manager (AOM) plugin, Restricted Security Area (RSA) Surveillance plugin, and Inter-System Gateway (IS Gateway) service are affected and must be patched as soon as possible in order to mitigate any risk of compromise.

Risk assessment

This vulnerability, identified as CVE-2022-37026, originates from a bug in Erlang OTP and may allow a malicious actor to bypass the authentication process and impersonate other users when the server is configured to use TLS or DTLS authentication.

This vulnerability has a base score of 9.8 (CVSS 3.1)

Affected products

Genetec products Version Update with
Sipelia 2.10 and earlier Sipelia 2.12GA
Mission Control All RabbitMQ 3.9.15.1
IoT Plugin All RabbitMQ 3.9.15.1
ISG Plugin All RabbitMQ 3.9.15.1
RSA Plugin All RabbitMQ 3.9.15.1
AOM Plugin All RabbitMQ 3.9.15.1

 

Please refer to KBA-79137 for more details.

Recommendation

To remediate this vulnerability for Sipelia, Genetec Inc. recommends that their customers update Sipelia to the latest version (Sipelia 2.12GA).

To address this vulnerability for the other impacted products, Genetec Inc. recommends that their customers update their systems with a newer version of RabbitMQ (RabbitMQ 3.9.15.1).

The packages are available on the Genetec Technical Assistance Portal (GTAP).

If you would like more information or need assistance, please log in to the Genetec Technical Assistance Portal (GTAP) to open a ticket.