ID

VAR-201212-0070


CVE

CVE-2012-3002


TITLE

Multi-vendor IP camera web interface authentication bypass

Trust: 0.8

sources: CERT/CC: VU#265532

DESCRIPTION

The web interface on (1) Foscam and (2) Wansview IP cameras allows remote attackers to bypass authentication, and perform administrative functions or read the admin password, via a direct request to an unspecified URL. Other vendors that share the same base firmware image are also vulnerable. Successful exploits may allow attackers to bypass certain security restrictions and gain unauthorized administrator access. Foscam/Wansview H.264 Hi3510/11/12 IP cameras are web-based implementations of IP cameras. ---------------------------------------------------------------------- The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/ ---------------------------------------------------------------------- TITLE: Foscam IP Cameras Web Interface Security Bypass Vulnerability SECUNIA ADVISORY ID: SA50950 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/50950/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=50950 RELEASE DATE: 2012-10-17 DISCUSS ADVISORY: http://secunia.com/advisories/50950/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/50950/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=50950 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in Foscam IP Cameras, which can be exploited by malicious people to bypass certain security restrictions. The vulnerability is caused due to an unspecified error in the web-based management interface and can be exploited to execute arbitrary commands with privileges of an administrative user. SOLUTION: No official solution is currently available. PROVIDED AND/OR DISCOVERED BY: US-CERT credits Don Kennedy. ORIGINAL ADVISORY: US-CERT (VU#265532): http://www.kb.cert.org/vuls/id/265532 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.88

sources: NVD: CVE-2012-3002 // CERT/CC: VU#265532 // JVNDB: JVNDB-2012-004937 // BID: 55873 // VULHUB: VHN-56283 // PACKETSTORM: 117431 // PACKETSTORM: 117427

AFFECTED PRODUCTS

vendor:wansviewmodel:h.264 hi3510\/11\/12 ip camerascope:eqversion: -

Trust: 1.6

vendor:foscammodel:h.264 hi3510\/11\/12 ip camerascope:eqversion: -

Trust: 1.0

vendor:foscam intelligentmodel: - scope: - version: -

Trust: 0.8

vendor:wansviewmodel: - scope: - version: -

Trust: 0.8

vendor:foscam intelligentmodel:h264 ip camerascope: - version: -

Trust: 0.8

vendor:wansviewmodel:wireless ip camerascope: - version: -

Trust: 0.8

sources: CERT/CC: VU#265532 // JVNDB: JVNDB-2012-004937 // CNNVD: CNNVD-201210-202 // NVD: CVE-2012-3002

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2012-3002
value: HIGH

Trust: 1.6

nvd@nist.gov: CVE-2012-3002
value: HIGH

Trust: 1.0

CNNVD: CNNVD-201210-202
value: CRITICAL

Trust: 0.6

VULHUB: VHN-56283
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2012-3002
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

NVD: CVE-2012-3002
severity: HIGH
baseScore: 9.7
vectorString: NONE
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 9.5
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-56283
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#265532 // VULHUB: VHN-56283 // JVNDB: JVNDB-2012-004937 // CNNVD: CNNVD-201210-202 // NVD: CVE-2012-3002

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.9

sources: VULHUB: VHN-56283 // JVNDB: JVNDB-2012-004937 // NVD: CVE-2012-3002

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201210-202

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-201210-202

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-004937

EXPLOIT AVAILABILITY

sources: CERT/CC: VU#265532

PATCH

title:ShenZhen Foscam Intelligent Technology Limitedurl:http://www.foscam.com/

Trust: 0.8

title:H264 IP Camera Web Interface Authentication Bypass Test Toolurl:http://foscam.us/forum/h264-ip-camera-web-interface-authentication-bypass-test-tool-t3252.html

Trust: 0.8

title:Downloadurl:http://www.foscam.com/help.aspx?TypeId=11

Trust: 0.8

title:Wansview Wireless IP Camerasurl:http://wansview.net/

Trust: 0.8

sources: JVNDB: JVNDB-2012-004937

EXTERNAL IDS

db:CERT/CCid:VU#265532

Trust: 3.5

db:NVDid:CVE-2012-3002

Trust: 2.8

db:BIDid:55873

Trust: 2.0

db:SECUNIAid:50950

Trust: 1.9

db:SECUNIAid:50966

Trust: 1.9

db:JVNDBid:JVNDB-2012-004937

Trust: 0.8

db:CNNVDid:CNNVD-201210-202

Trust: 0.7

db:VULHUBid:VHN-56283

Trust: 0.1

db:PACKETSTORMid:117431

Trust: 0.1

db:PACKETSTORMid:117427

Trust: 0.1

sources: CERT/CC: VU#265532 // VULHUB: VHN-56283 // BID: 55873 // JVNDB: JVNDB-2012-004937 // PACKETSTORM: 117431 // PACKETSTORM: 117427 // CNNVD: CNNVD-201210-202 // NVD: CVE-2012-3002

REFERENCES

url:http://www.kb.cert.org/vuls/id/265532

Trust: 2.7

url:http://foscam.us/forum/h264-ip-camera-web-interface-authentication-bypass-test-tool-t3252.html

Trust: 2.5

url:http://www.securityfocus.com/bid/55873

Trust: 1.7

url:http://www.foscam.com/help.aspx?typeid=11

Trust: 1.7

url:http://secunia.com/advisories/50950

Trust: 1.7

url:http://secunia.com/advisories/50966

Trust: 1.7

url:http://www.foscam.com/

Trust: 0.8

url:http://wansview.net/

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3002

Trust: 0.8

url:http://jvn.jp/cert/jvnvu265532/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-3002

Trust: 0.8

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.2

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/blog/325/

Trust: 0.2

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.2

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=50950

Trust: 0.1

url:http://secunia.com/advisories/50950/

Trust: 0.1

url:http://secunia.com/advisories/50950/#comments

Trust: 0.1

url:http://secunia.com/advisories/50966/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=50966

Trust: 0.1

url:http://secunia.com/advisories/50966/#comments

Trust: 0.1

sources: CERT/CC: VU#265532 // VULHUB: VHN-56283 // JVNDB: JVNDB-2012-004937 // PACKETSTORM: 117431 // PACKETSTORM: 117427 // CNNVD: CNNVD-201210-202 // NVD: CVE-2012-3002

CREDITS

Don Kennedy

Trust: 0.9

sources: BID: 55873 // CNNVD: CNNVD-201210-202

SOURCES

db:CERT/CCid:VU#265532
db:VULHUBid:VHN-56283
db:BIDid:55873
db:JVNDBid:JVNDB-2012-004937
db:PACKETSTORMid:117431
db:PACKETSTORMid:117427
db:CNNVDid:CNNVD-201210-202
db:NVDid:CVE-2012-3002

LAST UPDATE DATE

2025-04-11T23:12:01.831000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#265532date:2012-10-23T00:00:00
db:VULHUBid:VHN-56283date:2013-03-02T00:00:00
db:BIDid:55873date:2012-10-10T00:00:00
db:JVNDBid:JVNDB-2012-004937date:2012-12-25T00:00:00
db:CNNVDid:CNNVD-201210-202date:2012-12-25T00:00:00
db:NVDid:CVE-2012-3002date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CERT/CCid:VU#265532date:2012-10-10T00:00:00
db:VULHUBid:VHN-56283date:2012-12-21T00:00:00
db:BIDid:55873date:2012-10-10T00:00:00
db:JVNDBid:JVNDB-2012-004937date:2012-10-16T00:00:00
db:PACKETSTORMid:117431date:2012-10-17T10:04:33
db:PACKETSTORMid:117427date:2012-10-17T10:04:20
db:CNNVDid:CNNVD-201210-202date:2012-10-16T00:00:00
db:NVDid:CVE-2012-3002date:2012-12-21T11:47:36.363