Lucene search

K
cve[email protected]CVE-2018-16946
HistorySep 12, 2018 - 1:29 a.m.

CVE-2018-16946

2018-09-1201:29:00
CWE-552
web.nvd.nist.gov
37
cve-2018-16946
lg
smart network camera
access control
authentication
sensitive files
nvd

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.4 High

AI Score

Confidence

High

0.437 Medium

EPSS

Percentile

97.4%

LG LNB*, LND*, LNU*, and LNV* smart network camera devices have broken access control. Attackers are able to download /updownload/t.report (aka Log & Report) files and download backup files (via download.php) without authenticating. These backup files contain user credentials and configuration information for the camera device. An attacker is able to discover the backup filename via reading the system logs or report data, or just by brute-forcing the backup filename pattern. It may be possible to authenticate to the admin account with the admin password.

Affected configurations

NVD
Node
lglnb5110_firmwareRange13102501508190
AND
lglnb5110Match-
Node
lglnb5320_firmwareRange13102501508190
AND
lglnb5320Match-
Node
lglnb5320r_firmwareRange13102501508190
AND
lglnb5320rMatch-
Node
lglnb7210_firmwareRange13102501508190
AND
lglnb7210Match-
Node
lglnd3230r_firmwareRange13102501508190
AND
lglnd3230rMatch-
Node
lglnd5110_firmwareRange13102501508190
AND
lglnd5110Match-
Node
lglnd5110r_firmwareRange13102501508190
AND
lglnd5110rMatch-
Node
lglnd5220r_firmwareRange13102501508190
AND
lglnd5220rMatch-
Node
lglnd7210_firmwareRange13102501508190
AND
lglnd7210Match-
Node
lglnd7210r_firmwareRange13102501508190
AND
lglnd7210rMatch-
Node
lglnu3230r_firmwareRange13102501508190
AND
lglnu3230rMatch-
Node
lglnu5110r_firmwareRange13102501508190
AND
lglnu5110rMatch-
Node
lglnu5320r_firmwareRange13102501508190
AND
lglnu5320rMatch-
Node
lglnu7210r_firmwareRange13102501508190
AND
lglnu7210rMatch-
Node
lglnv5110r_firmwareRange13102501508190
AND
lglnv5110rMatch-
Node
lglnv5320r_firmwareRange13102501508190
AND
lglnv5320rMatch-
Node
lglnv7210_firmwareRange13102501508190
AND
lglnv7210Match-
Node
lglnv7210r_firmwareRange13102501508190
AND
lglnv7210rMatch-

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.4 High

AI Score

Confidence

High

0.437 Medium

EPSS

Percentile

97.4%