ID

VAR-201807-2145


CVE

CVE-2018-6832


TITLE

plural Foscam Buffer error vulnerability in product firmware

Trust: 0.8

sources: JVNDB: JVNDB-2018-008211

DESCRIPTION

Stack-based buffer overflow in the getSWFlag function in Foscam Cameras C1 Lite V3, and C1 V3 with firmware 2.82.2.33 and earlier, FI9800P V3, FI9803P V4, FI9851P V3, and FI9853EP V2 2.84.2.33 and earlier, FI9816P V3, FI9821EP V2, FI9821P V3, FI9826P V3, and FI9831P V3 2.81.2.33 and earlier, C1, C1 V2, C1 Lite, and C1 Lite V2 2.52.2.47 and earlier, FI9800P, FI9800P V2, FI9803P V2, FI9803P V3, and FI9851P V2 2.54.2.47 and earlier, FI9815P, FI9815P V2, FI9816P, and FI9816P V2, 2.51.2.47 and earlier, R2 and R4 2.71.1.59 and earlier, C2 and FI9961EP 2.72.1.59 and earlier, FI9900EP, FI9900P, and FI9901EP 2.74.1.59 and earlier, FI9928P 2.74.1.58 and earlier, FI9803EP and FI9853EP 2.22.2.31 and earlier, FI9803P and FI9851P 2.24.2.31 and earlier, FI9821P V2, FI9826P V2, FI9831P V2, and FI9821EP 2.21.2.31 and earlier, FI9821W V2, FI9831W, FI9826W, FI9821P, FI9831P, and FI9826P 2.11.1.120 and earlier, FI9818W V2 2.13.2.120 and earlier, FI9805W, FI9804W, FI9804P, FI9805E, and FI9805P 2.14.1.120 and earlier, FI9828P, and FI9828W 2.13.1.120 and earlier, and FI9828P V2 2.11.1.133 and earlier allows remote attackers to cause a denial of service (crash and reboot), via the callbackJson parameter. plural Foscam The product contains a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Foscomm (FOSCAM) is a safe living brand under the Shenzhen Foscom Intelligent Technology Co., Ltd., covering network video surveillance products (webcam, hard disk recorder, monitoring kit), video cloud storage services. The Foscom Foscam camera has a stack buffer overflow vulnerability that allows an attacker to exploit the vulnerability to crash the device's webService process. Foscam Cameras C1 Lite V3 etc. are network camera products of China Foscam (FOSCAM) company. A remote attacker could use the 'callbackJson' parameter to cause a denial of service (crash and restart)

Trust: 2.25

sources: NVD: CVE-2018-6832 // JVNDB: JVNDB-2018-008211 // CNVD: CNVD-2018-12142 // VULHUB: VHN-136864

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2018-12142

AFFECTED PRODUCTS

vendor:foscammodel:fi9828pscope:lteversion:2.11.1.133

Trust: 1.0

vendor:foscammodel:fi9851pscope:lteversion:2.54.2.47

Trust: 1.0

vendor:foscammodel:fi9803pscope:lteversion:2.24.2.31

Trust: 1.0

vendor:foscammodel:fi9853epscope:lteversion:2.22.2.31

Trust: 1.0

vendor:foscammodel:c1 litescope:lteversion:2.52.2.47

Trust: 1.0

vendor:foscammodel:fi9901epscope:lteversion:2.74.1.59

Trust: 1.0

vendor:foscammodel:c1scope:lteversion:2.52.2.47

Trust: 1.0

vendor:foscammodel:fi9803pscope:lteversion:2.54.2.47

Trust: 1.0

vendor:foscammodel:c2scope:lteversion:2.72.1.59

Trust: 1.0

vendor:foscammodel:fi9928pscope:lteversion:2.74.1.58

Trust: 1.0

vendor:foscammodel:fi9805pscope:lteversion:2.14.1.120

Trust: 1.0

vendor:foscammodel:fi9803epscope:lteversion:2.22.2.31

Trust: 1.0

vendor:foscammodel:fi9831pscope:lteversion:2.11.1.120

Trust: 1.0

vendor:foscammodel:fi9826pscope:lteversion:2.11.1.120

Trust: 1.0

vendor:foscammodel:fi9821pscope:lteversion:2.11.1.120

Trust: 1.0

vendor:foscammodel:fi9826pscope:lteversion:2.21.2.31

Trust: 1.0

vendor:foscammodel:r4scope:lteversion:2.71.1.59

Trust: 1.0

vendor:foscammodel:fi9831pscope:lteversion:2.21.2.31

Trust: 1.0

vendor:foscammodel:fi9821pscope:lteversion:2.21.2.31

Trust: 1.0

vendor:foscammodel:fi9800pscope:lteversion:2.81.2.33

Trust: 1.0

vendor:foscammodel:fi9831wscope:lteversion:2.11.1.120

Trust: 1.0

vendor:foscammodel:c1 litescope:lteversion:2.82.2.33

Trust: 1.0

vendor:foscammodel:c1scope:lteversion:2.82.2.33

Trust: 1.0

vendor:foscammodel:fi9900pscope:lteversion:2.74.1.59

Trust: 1.0

vendor:foscammodel:fi9828pscope:lteversion:2.13.1.120

Trust: 1.0

vendor:foscammodel:fi9804pscope:lteversion:2.14.1.120

Trust: 1.0

vendor:foscammodel:fi9821epscope:lteversion:2.21.2.31

Trust: 1.0

vendor:foscammodel:fi9800pscope:lteversion:2.54.2.47

Trust: 1.0

vendor:foscammodel:fi9961epscope:lteversion:2.72.1.59

Trust: 1.0

vendor:foscammodel:fi9900epscope:lteversion:2.74.1.59

Trust: 1.0

vendor:foscammodel:r2scope:lteversion:2.71.1.59

Trust: 1.0

vendor:foscammodel:fi9818wscope:lteversion:2.13.2.120

Trust: 1.0

vendor:foscammodel:fi9828wscope:lteversion:2.13.1.120

Trust: 1.0

vendor:foscammodel:fi9805escope:lteversion:2.14.1.120

Trust: 1.0

vendor:foscammodel:fi9821wscope:lteversion:2.11.1.120

Trust: 1.0

vendor:foscammodel:fi9826pscope:lteversion:2.81.2.33

Trust: 1.0

vendor:foscammodel:fi9831pscope:lteversion:2.81.2.33

Trust: 1.0

vendor:foscammodel:fi9821pscope:lteversion:2.81.2.33

Trust: 1.0

vendor:foscammodel:fi9815pscope:lteversion:2.51.2.47

Trust: 1.0

vendor:foscammodel:fi9821epscope:lteversion:2.81.2.33

Trust: 1.0

vendor:foscammodel:fi9851pscope:lteversion:2.24.2.31

Trust: 1.0

vendor:foscammodel:fi9826wscope:lteversion:2.11.1.120

Trust: 1.0

vendor:foscammodel:fi9805wscope:lteversion:2.14.1.120

Trust: 1.0

vendor:foscammodel:fi9816pscope:lteversion:2.51.2.47

Trust: 1.0

vendor:foscammodel:fi9804wscope:lteversion:2.14.1.120

Trust: 1.0

vendor:foscammodel:c1 litescope: - version: -

Trust: 0.8

vendor:foscammodel:c1scope: - version: -

Trust: 0.8

vendor:foscammodel:c2scope: - version: -

Trust: 0.8

vendor:foscammodel:fi9800pscope: - version: -

Trust: 0.8

vendor:foscammodel:fi9900pscope: - version: -

Trust: 0.8

vendor:foscammodel:r2scope: - version: -

Trust: 0.8

vendor:foscammodel:r4scope: - version: -

Trust: 0.8

vendor:foscammodel:foscamscope: - version: -

Trust: 0.6

vendor:foscammodel:fi9800pscope:eqversion:2.54.2.47

Trust: 0.6

vendor:foscammodel:fi9821pscope:eqversion:2.81.2.33

Trust: 0.6

vendor:foscammodel:c1 litescope:eqversion:2.82.2.33

Trust: 0.6

vendor:foscammodel:c1scope:eqversion:2.52.2.47

Trust: 0.6

vendor:foscammodel:fi9831pscope:eqversion:2.81.2.33

Trust: 0.6

vendor:foscammodel:fi9821epscope:eqversion:2.81.2.33

Trust: 0.6

vendor:foscammodel:fi9826pscope:eqversion:2.81.2.33

Trust: 0.6

vendor:foscammodel:fi9800pscope:eqversion:2.81.2.33

Trust: 0.6

vendor:foscammodel:c1 litescope:eqversion:2.52.2.47

Trust: 0.6

vendor:foscammodel:c1scope:eqversion:2.82.2.33

Trust: 0.6

sources: CNVD: CNVD-2018-12142 // JVNDB: JVNDB-2018-008211 // CNNVD: CNNVD-201807-495 // NVD: CVE-2018-6832

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-6832
value: HIGH

Trust: 1.0

NVD: CVE-2018-6832
value: HIGH

Trust: 0.8

CNVD: CNVD-2018-12142
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201807-495
value: HIGH

Trust: 0.6

VULHUB: VHN-136864
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-6832
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2018-12142
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-136864
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-6832
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2018-12142 // VULHUB: VHN-136864 // JVNDB: JVNDB-2018-008211 // CNNVD: CNNVD-201807-495 // NVD: CVE-2018-6832

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.1

problemtype:CWE-119

Trust: 0.9

sources: VULHUB: VHN-136864 // JVNDB: JVNDB-2018-008211 // NVD: CVE-2018-6832

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201807-495

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201807-495

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-008211

PATCH

title:Securing Your Foscam Camera - Important Noticeurl:https://www.foscam.com/company/securing-your-foscam-camera-important-notice.html

Trust: 0.8

title:Forskcom Foscam Camera Stack Buffer Overflow Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/132883

Trust: 0.6

title:Multiple Foscam Product Buffer Error Vulnerability Fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=84013

Trust: 0.6

sources: CNVD: CNVD-2018-12142 // JVNDB: JVNDB-2018-008211 // CNNVD: CNNVD-201807-495

EXTERNAL IDS

db:NVDid:CVE-2018-6832

Trust: 3.1

db:JVNDBid:JVNDB-2018-008211

Trust: 0.8

db:CNNVDid:CNNVD-201807-495

Trust: 0.7

db:CNVDid:CNVD-2018-12142

Trust: 0.6

db:VULHUBid:VHN-136864

Trust: 0.1

sources: CNVD: CNVD-2018-12142 // VULHUB: VHN-136864 // JVNDB: JVNDB-2018-008211 // CNNVD: CNNVD-201807-495 // NVD: CVE-2018-6832

REFERENCES

url:https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/

Trust: 2.3

url:https://www.foscam.com/company/securing-your-foscam-camera-important-notice.html

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-6832

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-6832

Trust: 0.8

sources: CNVD: CNVD-2018-12142 // VULHUB: VHN-136864 // JVNDB: JVNDB-2018-008211 // CNNVD: CNNVD-201807-495 // NVD: CVE-2018-6832

SOURCES

db:CNVDid:CNVD-2018-12142
db:VULHUBid:VHN-136864
db:JVNDBid:JVNDB-2018-008211
db:CNNVDid:CNNVD-201807-495
db:NVDid:CVE-2018-6832

LAST UPDATE DATE

2024-11-23T22:45:15.784000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-12142date:2018-06-27T00:00:00
db:VULHUBid:VHN-136864date:2020-08-24T00:00:00
db:JVNDBid:JVNDB-2018-008211date:2018-10-11T00:00:00
db:CNNVDid:CNNVD-201807-495date:2020-08-25T00:00:00
db:NVDid:CVE-2018-6832date:2024-11-21T04:11:15.963

SOURCES RELEASE DATE

db:CNVDid:CNVD-2018-12142date:2018-06-27T00:00:00
db:VULHUBid:VHN-136864date:2018-07-09T00:00:00
db:JVNDBid:JVNDB-2018-008211date:2018-10-11T00:00:00
db:CNNVDid:CNNVD-201807-495date:2018-07-09T00:00:00
db:NVDid:CVE-2018-6832date:2018-07-09T17:29:00.323