Description
A client-side remote code execution vulnerability exists in Hanwha Techwin Smart Security Manager (SSM) versions 1.32 and 1.4, due to improper restrictions on the PUT method exposed by the bundled Apache ActiveMQ instance (running on port 8161). An attacker can exploit this flaw through a Cross-Origin Resource Sharing (CORS) bypass combined with JavaScript-triggered file uploads to the web server, ultimately resulting in arbitrary code execution with SYSTEM privileges. This vulnerability bypasses the server-side mitigations introduced in ZDI-15-156 and ZDI-16-481 by shifting the exploitation to the client-side. This product is now referred to as Hanwha Wisenet SSM and it is unknown if current versions are affected.
References (6)
Core 6
Core References
Various Sources patch
https://web.archive.org/web/20160518205411/http://security.hanwhatechwin.com/product/product_view.asp?idx=6779#FL080000
Various Sources exploit
https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/browser/samsung_security_manager_put.rb
Third Party Advisory third-party-advisory
http://www.zerodayinitiative.com/advisories/ZDI-15-156/
Third Party Advisory third-party-advisory
http://www.zerodayinitiative.com/advisories/ZDI-16-481/
Various Sources third-party-advisory
https://srcincite.io/advisories/src-2016-0032/
Third Party Advisory third-party-advisory
https://www.vulncheck.com/advisories/samsung-security-manager-activemq-file-upload-rce
Scores
CVSS v4
8.6
EPSS
0.0097
EPSS Percentile
76.7%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-306
CWE-434
Status
published
Products (2)
Hanwha/Smart Security Manager (SSM)
1.32
Hanwha/Smart Security Manager (SSM)
1.4
Published
Jul 25, 2025
Tracked Since
Feb 18, 2026