Executive Summary

Summary
Title Multi-vendor IP camera web interface authentication bypass
Informations
Name VU#265532 First vendor Publication 2012-10-10
Vendor VU-CERT Last vendor Modification 2012-10-23
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#265532

Multi-vendor IP camera web interface authentication bypass

Original Release date: 10 Oct 2012 | Last revised: 23 Oct 2012

Overview

The web interface firmware for Foscam and Wansview H.264 Hi3510/11/12 IP cameras contain an authentication bypass vulnerability. Other vendors that share the same base firmware image are also vulnerable.

Description

It has been reported that the web interface for IP cameras from several vendors including Foscam and Wansview contain an authentication bypass vulnerability. By visiting specific URLs, an attacker may be able to perform any function a normal user can. The admin password is also leaked through client side Javascript.

Impact

A remote unauthenticated attacker may be able to execute any command available to the web interface including full administrative functions.

Solution

Apply an Update

Foscam has released firmware updates to address this vulnerability. Users should upgrade to the latest firmware version available for their camera.

If patches are not available from the vendor, please consider the following workaround.

Restrict Access

Appropriate firewall rules should be put in place so only trusted users can access the web interface.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Shenzhen Foscam Intelligent TechnologyAffected18 Sep 201210 Oct 2012
wansviewAffected-10 Oct 2012
apexisUnknown-10 Oct 2012
EasynUnknown-10 Oct 2012
EasySeUnknown-10 Oct 2012
HiwireUnknown-10 Oct 2012
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base9.7AV:N/AC:L/Au:N/C:C/I:C/A:P
Temporal7.9E:POC/RL:U/RC:UC
Environmental7.9CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND

References

  • http://www.foscam.com/
  • http://wansview.net/
  • http://foscam.us/forum/h264-ip-camera-web-interface-authentication-bypass-test-tool-t3252.html

Credit

Thanks to Don Kennedy for reporting this vulnerability.

This document was written by Jared Allar.

Other Information

  • CVE IDs:CVE-2012-3002
  • Date Public:08 Oct 2012
  • Date First Published:10 Oct 2012
  • Date Last Updated:23 Oct 2012
  • Document Revision:21

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.


This product is provided subject to the Notification as indicated here: http://www.us-cert.gov/legal.html#notify

Original Source

Url : http://www.kb.cert.org/vuls/id/265532

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-287 Improper Authentication

CPE : Common Platform Enumeration

TypeDescriptionCount
Hardware 1
Hardware 1

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2012-12-21 21:22:10
  • Multiple Updates
2012-12-21 13:21:18
  • Multiple Updates