ID

VAR-201011-0104


CVE

CVE-2010-4234


TITLE

Camtron CMNC-200 Full HD IP Camera of Web Service disruption at the server (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2010-003393

DESCRIPTION

The web server on the Camtron CMNC-200 Full HD IP Camera and TecVoz CMNC-200 Megapixel IP Camera with firmware 1.102A-008 allows remote attackers to cause a denial of service (device reboot) via a large number of requests in a short time interval. The Camtron CMNC-200 is a webcam. Camtron CMNC-200 Full HD IP Camera is prone to multiple security vulnerabilities. Exploiting these issues will allow remote attackers to execute arbitrary code, trigger a denial of service, or completely compromise the device. The vulnerable products are listed below: Camtron CMNC-200 Full HD IP Camera running firmware 1.102A-008 is vulnerable. TVSLiveControl 1.6.50.33 is vulnerable; others may also be affected. ---------------------------------------------------------------------- Secure your corporate defenses and reduce complexity in handling vulnerability threats with the new Secunia Vulnerability Intelligence Manager (VIM) Beta. Join the beta: http://secunia.com/products/corporate/vim/ ---------------------------------------------------------------------- TITLE: Camtron CMNC-200 Multiple Vulnerabilities SECUNIA ADVISORY ID: SA42229 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/42229/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=42229 RELEASE DATE: 2010-11-18 DISCUSS ADVISORY: http://secunia.com/advisories/42229/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/42229/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=42229 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Wendel G. Henrique has reported a security issue and some vulnerabilities in Camtron CMNC-200, which can be exploited by malicious people to bypass certain security restrictions, disclose potentially sensitive information, cause a DoS (Denial of Service), and compromise a vulnerable system. 1) Input passed via the URL to the device's web server is not properly verified before being used to read files. This can be exploited to read arbitrary files via directory traversal attacks. 2) The device does not properly restrict access to the administrative web interface. This can be exploited to bypass the authentication mechanism by e.g. appending a second forward slash ("/") after the hostname. 3) Undocumented, hardcoded user accounts can be exploited to e.g. gain access to the device via the telnet interface. 5) The device includes a vulnerable ActiveX control, which can be exploited to compromise a user's system. For more information: SA42311 The vulnerabilities are reported in version V1.102A-008 / Board ID 66. SOLUTION: Restrict and filter network access via a firewall. PROVIDED AND/OR DISCOVERED BY: Wendel G. Henrique, Trustwave's SpiderLabs ORIGINAL ADVISORY: https://www.trustwave.com/spiderlabs/advisories/TWSL2010-006.txt OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.61

sources: NVD: CVE-2010-4234 // JVNDB: JVNDB-2010-003393 // CNVD: CNVD-2010-2895 // BID: 44841 // VULHUB: VHN-46839 // PACKETSTORM: 95962

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2010-2895

AFFECTED PRODUCTS

vendor:tecvozmodel:cmnc-200scope:eqversion:1.102a-008

Trust: 2.4

vendor:camtronmodel:cmnc-200scope:eqversion:1.102a-008

Trust: 1.8

vendor:tecvozmodel:cmnc-200scope:eqversion:*

Trust: 1.0

vendor:camtronmodel:cmnc-200scope:eqversion:*

Trust: 1.0

vendor:camtronmodel:cmnc-200scope: - version: -

Trust: 0.8

vendor:tecvozmodel:cmnc-200scope: - version: -

Trust: 0.8

vendor:camtronmodel:cmnc-200 v1.102a-008 board idscope:eqversion:/66

Trust: 0.6

vendor:tvslivecontrolmodel:activex controlscope:eqversion:1.6.50.33

Trust: 0.3

vendor:camtronmodel:cmnc-200 full hd ip camera 1.102a-008scope: - version: -

Trust: 0.3

sources: CNVD: CNVD-2010-2895 // BID: 44841 // JVNDB: JVNDB-2010-003393 // CNNVD: CNNVD-201011-200 // NVD: CVE-2010-4234

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-4234
value: HIGH

Trust: 1.0

NVD: CVE-2010-4234
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201011-200
value: HIGH

Trust: 0.6

VULHUB: VHN-46839
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2010-4234
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-46839
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-46839 // JVNDB: JVNDB-2010-003393 // CNNVD: CNNVD-201011-200 // NVD: CVE-2010-4234

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-46839 // JVNDB: JVNDB-2010-003393 // NVD: CVE-2010-4234

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201011-200

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201011-200

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-003393

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-46839

PATCH

title:Top Pageurl:http://www.camtron.co.kr/

Trust: 0.8

title:Top Pageurl:http://www.tecvoz.com.br/

Trust: 0.8

sources: JVNDB: JVNDB-2010-003393

EXTERNAL IDS

db:NVDid:CVE-2010-4234

Trust: 3.4

db:EXPLOIT-DBid:15508

Trust: 1.7

db:JVNDBid:JVNDB-2010-003393

Trust: 0.8

db:SECUNIAid:42229

Trust: 0.7

db:CNNVDid:CNNVD-201011-200

Trust: 0.7

db:CNVDid:CNVD-2010-2895

Trust: 0.6

db:BUGTRAQid:20101112 TWSL2010-006: MULTIPLE VULNERABILITIES IN CAMTRON CMNC-200 IP CAMERA

Trust: 0.6

db:BIDid:44841

Trust: 0.3

db:SEEBUGid:SSVID-70207

Trust: 0.1

db:VULHUBid:VHN-46839

Trust: 0.1

db:PACKETSTORMid:95962

Trust: 0.1

sources: CNVD: CNVD-2010-2895 // VULHUB: VHN-46839 // BID: 44841 // JVNDB: JVNDB-2010-003393 // PACKETSTORM: 95962 // CNNVD: CNNVD-201011-200 // NVD: CVE-2010-4234

REFERENCES

url:https://www.trustwave.com/spiderlabs/advisories/twsl2010-006.txt

Trust: 2.1

url:http://www.exploit-db.com/exploits/15508

Trust: 1.7

url:http://www.securityfocus.com/archive/1/514753/100/0/threaded

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-4234

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-4234

Trust: 0.8

url:http://secunia.com/advisories/42229/http

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/514753/100/0/threaded

Trust: 0.6

url:http://seclists.org/fulldisclosure/2010/nov/127

Trust: 0.3

url:http://www.camtron.co.kr/

Trust: 0.3

url:http://secunia.com/products/corporate/evm/

Trust: 0.1

url:http://secunia.com/advisories/42229/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/42229/#comments

Trust: 0.1

url:http://secunia.com/products/corporate/vim/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=42229

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2010-2895 // VULHUB: VHN-46839 // BID: 44841 // JVNDB: JVNDB-2010-003393 // PACKETSTORM: 95962 // CNNVD: CNNVD-201011-200 // NVD: CVE-2010-4234

CREDITS

Wendel G. Henrique of Trustwave's SpiderLabs

Trust: 0.3

sources: BID: 44841

SOURCES

db:CNVDid:CNVD-2010-2895
db:VULHUBid:VHN-46839
db:BIDid:44841
db:JVNDBid:JVNDB-2010-003393
db:PACKETSTORMid:95962
db:CNNVDid:CNNVD-201011-200
db:NVDid:CVE-2010-4234

LAST UPDATE DATE

2025-04-11T21:46:49.674000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2010-2895date:2010-11-19T00:00:00
db:VULHUBid:VHN-46839date:2018-10-10T00:00:00
db:BIDid:44841date:2010-11-18T11:06:00
db:JVNDBid:JVNDB-2010-003393date:2012-03-27T00:00:00
db:CNNVDid:CNNVD-201011-200date:2010-11-18T00:00:00
db:NVDid:CVE-2010-4234date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CNVDid:CNVD-2010-2895date:2010-11-19T00:00:00
db:VULHUBid:VHN-46839date:2010-11-17T00:00:00
db:BIDid:44841date:2010-11-12T00:00:00
db:JVNDBid:JVNDB-2010-003393date:2012-03-27T00:00:00
db:PACKETSTORMid:95962date:2010-11-18T04:41:36
db:CNNVDid:CNNVD-201011-200date:2010-11-18T00:00:00
db:NVDid:CVE-2010-4234date:2010-11-17T01:00:04.010