Lucene search

K
certCERTVU:265532
HistoryOct 10, 2012 - 12:00 a.m.

Multi-vendor IP camera web interface authentication bypass

2012-10-1000:00:00
www.kb.cert.org
35

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.016 Low

EPSS

Percentile

87.7%

Overview

The web interface firmware for Foscam and Wansview H.264 Hi3510/11/12 IP cameras contain an authentication bypass vulnerability. Other vendors that share the same base firmware image are also vulnerable.

Description

It has been reported that the web interface for IP cameras from several vendors including Foscam and Wansview contain an authentication bypass vulnerability. By visiting specific URLs, an attacker may be able to perform any function a normal user can. The admin password is also leaked through client side Javascript.


Impact

A remote unauthenticated attacker may be able to execute any command available to the web interface including full administrative functions.


Solution

Apply an Update

Foscam has released firmware updates to address this vulnerability. Users should upgrade to the latest firmware version available for their camera.

If patches are not available from the vendor, please consider the following workaround.


Restrict Access

Appropriate firewall rules should be put in place so only trusted users can access the web interface.


Vendor Information

265532

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Shenzhen Foscam Intelligent Technology Affected

Notified: September 18, 2012 Updated: October 10, 2012

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

wansview Affected

Updated: October 10, 2012

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

EasySe Unknown

Updated: October 10, 2012

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Easyn Unknown

Updated: October 10, 2012

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Hiwire Unknown

Updated: October 10, 2012

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

apexis Unknown

Updated: October 10, 2012

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

CVSS Metrics

Group Score Vector
Base 9.7 AV:N/AC:L/Au:N/C:C/I:C/A:P
Temporal 7.9 E:POC/RL:U/RC:UC
Environmental 7.9 CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND

References

Acknowledgements

Thanks to Don Kennedy for reporting this vulnerability.

This document was written by Jared Allar.

Other Information

CVE IDs: CVE-2012-3002
Date Public: 2012-10-08 Date First Published:

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.016 Low

EPSS

Percentile

87.7%

Related for VU:265532