ID

VAR-201809-0079


CVE

CVE-2017-2854


TITLE

Foscam C1 Indoor HD Camera Buffer error vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-014271

DESCRIPTION

An exploitable buffer overflow vulnerability exists in the DDNS client used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. On devices with DDNS enabled, an attacker who is able to intercept HTTP connections will be able to fully compromise the device by creating a rogue HTTP server. FoscamC1IndoorHDCamera is a wireless HD IP camera from China Foscam. DDNSclient is one of the dynamic domain name service clients

Trust: 2.25

sources: NVD: CVE-2017-2854 // JVNDB: JVNDB-2017-014271 // CNVD: CNVD-2017-34260 // VULHUB: VHN-111057

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

category:['camera device']sub_category:smart home camera

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2017-34260

AFFECTED PRODUCTS

vendor:foscammodel:c1scope:eqversion:2.52.2.43

Trust: 2.4

vendor:foscammodel:systemscope:eqversion:1.9.3.18

Trust: 0.6

vendor:foscammodel:indoor ip camera c1 plug-inscope:eqversion:3.3.0.26

Trust: 0.6

vendor:foscammodel:indoor ip camera c1 applicationscope:eqversion:2.52.2.43

Trust: 0.6

sources: CNVD: CNVD-2017-34260 // JVNDB: JVNDB-2017-014271 // CNNVD: CNNVD-201711-420 // NVD: CVE-2017-2854

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-2854
value: HIGH

Trust: 1.0

talos-cna@cisco.com: CVE-2017-2854
value: HIGH

Trust: 1.0

NVD: CVE-2017-2854
value: HIGH

Trust: 0.8

CNVD: CNVD-2017-34260
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201711-420
value: HIGH

Trust: 0.6

VULHUB: VHN-111057
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-2854
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-34260
severity: HIGH
baseScore: 7.6
vectorString: AV:N/AC:H/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 4.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-111057
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

talos-cna@cisco.com: CVE-2017-2854
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 5.9
version: 3.0

Trust: 1.8

nvd@nist.gov: CVE-2017-2854
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2017-34260 // VULHUB: VHN-111057 // JVNDB: JVNDB-2017-014271 // CNNVD: CNNVD-201711-420 // NVD: CVE-2017-2854 // NVD: CVE-2017-2854

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:CWE-119

Trust: 0.9

sources: VULHUB: VHN-111057 // JVNDB: JVNDB-2017-014271 // NVD: CVE-2017-2854

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201711-420

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201711-420

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-014271

PATCH

title:Top Pageurl:https://www.foscam.com/downloads/index.html

Trust: 0.8

title:Patch for FoscamC1IndoorHDCameraDDNS Client Buffer Overflow Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/106246

Trust: 0.6

title:Foscam C1 Indoor HD Camera DDNS Fixes for client buffer error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=76288

Trust: 0.6

title:Foscam C1 Indoor HD Camera DDNS Fixes for client buffer error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=76294

Trust: 0.6

sources: CNVD: CNVD-2017-34260 // JVNDB: JVNDB-2017-014271 // CNNVD: CNNVD-201711-420

EXTERNAL IDS

db:NVDid:CVE-2017-2854

Trust: 3.2

db:TALOSid:TALOS-2017-0357

Trust: 3.1

db:JVNDBid:JVNDB-2017-014271

Trust: 0.8

db:CNNVDid:CNNVD-201711-420

Trust: 0.7

db:CNVDid:CNVD-2017-34260

Trust: 0.6

db:OTHERid:NONE

Trust: 0.1

db:SEEBUGid:SSVID-96860

Trust: 0.1

db:VULHUBid:VHN-111057

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2017-34260 // VULHUB: VHN-111057 // JVNDB: JVNDB-2017-014271 // CNNVD: CNNVD-201711-420 // NVD: CVE-2017-2854

REFERENCES

url:https://www.talosintelligence.com/vulnerability_reports/talos-2017-0357

Trust: 1.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-2854

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-2854

Trust: 0.8

url:https://www.talosintelligence.com/reports/talos-2017-0357/

Trust: 0.6

url:https://talosintelligence.com/vulnerability_reports/talos-2017-0357

Trust: 0.6

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2017-34260 // VULHUB: VHN-111057 // JVNDB: JVNDB-2017-014271 // CNNVD: CNNVD-201711-420 // NVD: CVE-2017-2854

CREDITS

Claudio Bozzato and another member of Cisco Talos

Trust: 0.6

sources: CNNVD: CNNVD-201711-420

SOURCES

db:OTHERid: -
db:CNVDid:CNVD-2017-34260
db:VULHUBid:VHN-111057
db:JVNDBid:JVNDB-2017-014271
db:CNNVDid:CNNVD-201711-420
db:NVDid:CVE-2017-2854

LAST UPDATE DATE

2025-01-30T19:29:29.670000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-34260date:2017-11-17T00:00:00
db:VULHUBid:VHN-111057date:2018-12-13T00:00:00
db:JVNDBid:JVNDB-2017-014271date:2018-12-14T00:00:00
db:CNNVDid:CNNVD-201711-420date:2022-06-08T00:00:00
db:NVDid:CVE-2017-2854date:2024-11-21T03:24:19.960

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-34260date:2017-11-17T00:00:00
db:VULHUBid:VHN-111057date:2018-09-17T00:00:00
db:JVNDBid:JVNDB-2017-014271date:2018-12-14T00:00:00
db:CNNVDid:CNNVD-201711-420date:2017-11-14T00:00:00
db:NVDid:CVE-2017-2854date:2018-09-17T20:29:00.367