Executive Summary

Summary
Title Foscam IP camera authentication bypass vulnerability
Informations
Name VU#525132 First vendor Publication 2014-03-03
Vendor VU-CERT Last vendor Modification 2014-03-03
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:N/A:N)
Cvss Base Score 7.8 Attack Range Network
Cvss Impact Score 6.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#525132

Foscam IP camera authentication bypass vulnerability

Original Release date: 03 Mar 2014 | Last revised: 03 Mar 2014

Overview

The FI8910W Foscam IP camera running firmware version 11.37.2.54 fails to properly authenticate users.

Description

CWE-592: Authentication Bypass Issues - CVE-2014-1911

The FI8910W Foscam IP camera running firmware version 11.37.2.54 contains a vulnerability which allows an unauthenticated remote attacker to gain access to streaming video and image data.

Other models and firmwares may be affected.

Impact

An unauthenticated remote attacker may be able to gain privileged access to video and image data.

Solution

Apply an Update

Foscam advises users to upgrade to firmware 11.37.2.55. In addition, the following workaround is available:

Restrict Access
As a general good security practice, only allow connections from trusted hosts and networks. Appropriate firewall rules which block incoming connections from untrusted networks would likely prevent an external attacker from accessing the Foscam IP camera.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Shenzhen Foscam Intelligent TechnologyAffected22 Jan 201425 Feb 2014
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base7.8AV:N/AC:L/Au:N/C:C/I:N/A:N
Temporal6.8E:H/RL:OF/RC:C
Environmental1.7CDP:ND/TD:L/CR:ND/IR:ND/AR:ND

References

  • http://foscam.us/
  • http://foscam.us/forum/mjpeg-54-firmware-bug-user-logon-bypass-t8442.html

Credit

Thanks to KK "stiegl" for reporting this vulnerability.

This document was written by Todd Lewellen.

Other Information

  • CVE IDs:CVE-2014-1911
  • Date Public:03 Mar 2014
  • Date First Published:03 Mar 2014
  • Date Last Updated:03 Mar 2014
  • Document Revision:6

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/525132

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-287 Improper Authentication

CPE : Common Platform Enumeration

TypeDescriptionCount
Hardware 1
Os 1

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2014-03-07 13:26:20
  • Multiple Updates
2014-03-06 17:23:44
  • Multiple Updates
2014-03-03 21:19:40
  • First insertion