ID

VAR-201811-0731


CVE

CVE-2018-19070


TITLE

Foscam C2 Device and Opticam i5 In the device OS Command injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-011691

DESCRIPTION

An issue was discovered on Foscam C2 devices with System Firmware 1.11.1.8 and Application Firmware 2.72.1.32, and Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. They allow remote attackers to execute arbitrary OS commands via shell metacharacters in the usrName parameter of a CGIProxy.fcgi addAccount action. Foscam C2 Device and Opticam i5 The device includes OS A command injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Both Foscam C2 and Opticami 5 are network camera products from China Foscom (FOSCAM). An operating system command injection vulnerability exists in the FoscamC2 and Opticami5 devices. Security vulnerabilities exist in Foscam C2 and Opticam i5 devices

Trust: 2.25

sources: NVD: CVE-2018-19070 // JVNDB: JVNDB-2018-011691 // CNVD: CNVD-2019-04051 // VULHUB: VHN-129693

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-04051

AFFECTED PRODUCTS

vendor:opticammodel:i5 applicationscope:eqversion:2.21.1.128

Trust: 2.4

vendor:opticammodel:i5 systemscope:eqversion:1.5.2.11

Trust: 2.4

vendor:foscammodel:c2 applicationscope:eqversion:2.72.1.32

Trust: 1.8

vendor:foscammodel:c2 systemscope:eqversion:1.11.1.8

Trust: 1.8

vendor:foscammodel:c2 devices with systemscope:eqversion:1.11.1.8

Trust: 0.6

vendor:foscammodel:c2 devices with applicationscope:eqversion:2.72.1.32

Trust: 0.6

vendor:foscammodel:opticam i5 devices with systemscope:eqversion:1.5.2.11

Trust: 0.6

vendor:foscammodel:opticam i5 devices with applicationscope:eqversion:2.21.1.128

Trust: 0.6

sources: CNVD: CNVD-2019-04051 // JVNDB: JVNDB-2018-011691 // CNNVD: CNNVD-201811-147 // NVD: CVE-2018-19070

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-19070
value: HIGH

Trust: 1.0

NVD: CVE-2018-19070
value: HIGH

Trust: 0.8

CNVD: CNVD-2019-04051
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201811-147
value: CRITICAL

Trust: 0.6

VULHUB: VHN-129693
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-19070
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2019-04051
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-129693
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-19070
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2019-04051 // VULHUB: VHN-129693 // JVNDB: JVNDB-2018-011691 // CNNVD: CNNVD-201811-147 // NVD: CVE-2018-19070

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.9

sources: VULHUB: VHN-129693 // JVNDB: JVNDB-2018-011691 // NVD: CVE-2018-19070

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201811-147

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201811-147

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-011691

PATCH

title:C2url:https://www.foscam.com/C2.html

Trust: 0.8

sources: JVNDB: JVNDB-2018-011691

EXTERNAL IDS

db:NVDid:CVE-2018-19070

Trust: 3.1

db:JVNDBid:JVNDB-2018-011691

Trust: 0.8

db:CNNVDid:CNNVD-201811-147

Trust: 0.7

db:CNVDid:CNVD-2019-04051

Trust: 0.6

db:VULHUBid:VHN-129693

Trust: 0.1

sources: CNVD: CNVD-2019-04051 // VULHUB: VHN-129693 // JVNDB: JVNDB-2018-011691 // CNNVD: CNNVD-201811-147 // NVD: CVE-2018-19070

REFERENCES

url:https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2018-19070

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19070

Trust: 0.8

url:https://www.verkkokauppa.com/fi/product/52328/fcqxq/opticam-i5-hd-ip-kamera

Trust: 0.8

sources: CNVD: CNVD-2019-04051 // VULHUB: VHN-129693 // JVNDB: JVNDB-2018-011691 // CNNVD: CNNVD-201811-147 // NVD: CVE-2018-19070

SOURCES

db:CNVDid:CNVD-2019-04051
db:VULHUBid:VHN-129693
db:JVNDBid:JVNDB-2018-011691
db:CNNVDid:CNNVD-201811-147
db:NVDid:CVE-2018-19070

LAST UPDATE DATE

2024-11-23T23:04:56.264000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-04051date:2019-02-14T00:00:00
db:VULHUBid:VHN-129693date:2018-12-11T00:00:00
db:JVNDBid:JVNDB-2018-011691date:2019-01-18T00:00:00
db:CNNVDid:CNNVD-201811-147date:2018-11-08T00:00:00
db:NVDid:CVE-2018-19070date:2024-11-21T03:57:16.350

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-04051date:2019-02-14T00:00:00
db:VULHUBid:VHN-129693date:2018-11-07T00:00:00
db:JVNDBid:JVNDB-2018-011691date:2019-01-18T00:00:00
db:CNNVDid:CNNVD-201811-147date:2018-11-08T00:00:00
db:NVDid:CVE-2018-19070date:2018-11-07T18:29:02.773