Overview
The web interface firmware for Foscam and Wansview H.264 Hi3510/11/12 IP cameras contain an authentication bypass vulnerability. Other vendors that share the same base firmware image are also vulnerable.
Description
It has been reported that the web interface for IP cameras from several vendors including Foscam and Wansview contain an authentication bypass vulnerability. By visiting specific URLs, an attacker may be able to perform any function a normal user can. The admin password is also leaked through client side Javascript. |
Impact
A remote unauthenticated attacker may be able to execute any command available to the web interface including full administrative functions. |
Solution
Apply an Update Foscam has released firmware updates to address this vulnerability. Users should upgrade to the latest firmware version available for their camera. |
Restrict Access |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 9.7 | AV:N/AC:L/Au:N/C:C/I:C/A:P |
Temporal | 7.9 | E:POC/RL:U/RC:UC |
Environmental | 7.9 | CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND |
References
Acknowledgements
Thanks to Don Kennedy for reporting this vulnerability.
This document was written by Jared Allar.
Other Information
CVE IDs: | CVE-2012-3002 |
Date Public: | 2012-10-08 |
Date First Published: | 2012-10-10 |
Date Last Updated: | 2012-10-23 14:05 UTC |
Document Revision: | 22 |