Lucene search

K

Wireless Ip Camera (P2P) Firmware Security Vulnerabilities - November

cve
cve

CVE-2017-8221

Wireless IP Camera (P2P) WIFICAM devices rely on a cleartext UDP tunnel protocol (aka the Cloud feature) for communication between an Android application and a camera device, which allows remote attackers to obtain sensitive information by sniffing the network.

7.5CVSS

7.6AI Score

0.063EPSS

2017-04-25 08:59 PM
31
cve
cve

CVE-2017-8222

Wireless IP Camera (P2P) WIFICAM devices have an "Apple Production IOS Push Services" private RSA key and certificate stored in /system/www/pem/ck.pem inside the firmware, which allows attackers to obtain sensitive information.

7.5CVSS

7.8AI Score

0.004EPSS

2017-04-25 08:59 PM
29
cve
cve

CVE-2017-8223

On Wireless IP Camera (P2P) WIFICAM devices, an attacker can use the RTSP server on port 10554/tcp to watch the streaming without authentication via tcp/av0_1 or tcp/av0_0.

7.5CVSS

8.1AI Score

0.007EPSS

2017-04-25 08:59 PM
38
cve
cve

CVE-2017-8224

Wireless IP Camera (P2P) WIFICAM devices have a backdoor root account that can be accessed with TELNET.

9.8CVSS

9.4AI Score

0.009EPSS

2017-04-25 08:59 PM
177
cve
cve

CVE-2017-8225

On Wireless IP Camera (P2P) WIFICAM devices, access to .ini files (containing credentials) is not correctly checked. An attacker can bypass authentication by providing an empty loginuse parameter and an empty loginpas parameter in the URI.

9.8CVSS

9.5AI Score

0.012EPSS

2017-04-25 08:59 PM
114