ID

VAR-202002-0707


CVE

CVE-2020-3110


TITLE

Cisco Video Surveillance 8000 Series IP Camera input verification vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2020-001686

DESCRIPTION

A vulnerability in the Cisco Discovery Protocol implementation for the Cisco Video Surveillance 8000 Series IP Cameras could allow an unauthenticated, adjacent attacker to execute code remotely or cause a reload of an affected IP Camera. The vulnerability is due to missing checks when processing Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol packet to the targeted IP Camera. A successful exploit could allow the attacker to expose the affected IP Camera for remote code execution or cause it to reload unexpectedly, resulting in a denial of service (DoS) condition. Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). This vulnerability is fixed in Video Surveillance 8000 Series IP Camera Firmware Release 1.0.7 and later. (DoS) It may be put into a state

Trust: 2.16

sources: NVD: CVE-2020-3110 // JVNDB: JVNDB-2020-001686 // CNVD: CNVD-2020-16658

IOT TAXONOMY

category:['IoT']sub_category: -

Trust: 0.6

category:['camera device']sub_category:IP camera

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2020-16658

AFFECTED PRODUCTS

vendor:ciscomodel:video surveillance 8630 ip camerascope:ltversion:1.0.7

Trust: 1.0

vendor:ciscomodel:video surveillance 8000p ip camerascope:ltversion:1.0.7

Trust: 1.0

vendor:ciscomodel:video surveillance 8030 ip camerascope:ltversion:1.0.7

Trust: 1.0

vendor:ciscomodel:video surveillance 8620 ip camerascope:ltversion:1.0.7

Trust: 1.0

vendor:ciscomodel:video surveillance 8020 ip camerascope:ltversion:1.0.7

Trust: 1.0

vendor:ciscomodel:video surveillance 8070 ip camerascope:ltversion:1.0.7

Trust: 1.0

vendor:ciscomodel:video surveillance 8400 ip camerascope:ltversion:1.0.7

Trust: 1.0

vendor:ciscomodel:video surveillance 8930 speed dome ip camerascope:ltversion:1.0.7

Trust: 1.0

vendor:ciscomodel:video surveillance 8000p ip camerascope: - version: -

Trust: 0.8

vendor:ciscomodel:video surveillance 8020 ip camerascope: - version: -

Trust: 0.8

vendor:ciscomodel:video surveillance 8030 ip camerascope: - version: -

Trust: 0.8

vendor:ciscomodel:video surveillance 8070 ip camerascope: - version: -

Trust: 0.8

vendor:ciscomodel:video surveillance 8400 ip camerascope: - version: -

Trust: 0.8

vendor:ciscomodel:video surveillance 8620 ip camerascope: - version: -

Trust: 0.8

vendor:ciscomodel:video surveillance 8930 speed dome ip camerascope: - version: -

Trust: 0.8

vendor:ciscomodel:video surveillance 8630 ip camerascope: - version: -

Trust: 0.8

vendor:ciscomodel:video surveillance ptz ip camerasscope: - version: -

Trust: 0.6

vendor:ciscomodel:video surveillance series ip camerasscope:eqversion:7000

Trust: 0.6

vendor:ciscomodel:video surveillance series ip camerasscope:eqversion:6000

Trust: 0.6

vendor:ciscomodel:video surveillance 4300e and 4500e high-definition ip camerasscope: - version: -

Trust: 0.6

vendor:ciscomodel:video surveillance series high-definition ip camerasscope:eqversion:4000

Trust: 0.6

vendor:ciscomodel:video surveillance series ip camerasscope:eqversion:3000

Trust: 0.6

sources: CNVD: CNVD-2020-16658 // JVNDB: JVNDB-2020-001686 // NVD: CVE-2020-3110

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-3110
value: HIGH

Trust: 1.0

ykramarz@cisco.com: CVE-2020-3110
value: HIGH

Trust: 1.0

NVD: JVNDB-2020-001686
value: HIGH

Trust: 0.8

CNVD: CNVD-2020-16658
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202002-127
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2020-3110
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-001686
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2020-16658
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2020-3110
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

ykramarz@cisco.com: CVE-2020-3110
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.0

NVD: JVNDB-2020-001686
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2020-16658 // JVNDB: JVNDB-2020-001686 // CNNVD: CNNVD-202002-127 // NVD: CVE-2020-3110 // NVD: CVE-2020-3110

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.8

sources: JVNDB: JVNDB-2020-001686 // NVD: CVE-2020-3110

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202002-127

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202002-127

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-001686

PATCH

title:cisco-sa-20200205-ipcameras-rce-dosurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-ipcameras-rce-dos

Trust: 0.8

title:Patch for Cisco Discovery Protocol Authentication Vulnerability in Cisco Video Surveillance 8000 Series IP Camerasurl:https://www.cnvd.org.cn/patchInfo/show/208347

Trust: 0.6

title:Cisco Video Surveillance 8000 Series IP Cameras Cisco Discovery Protocol Enter the fix for the verification error vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=108693

Trust: 0.6

sources: CNVD: CNVD-2020-16658 // JVNDB: JVNDB-2020-001686 // CNNVD: CNNVD-202002-127

EXTERNAL IDS

db:NVDid:CVE-2020-3110

Trust: 3.2

db:PACKETSTORMid:156203

Trust: 1.7

db:JVNid:JVNVU95679983

Trust: 0.8

db:JVNDBid:JVNDB-2020-001686

Trust: 0.8

db:CNVDid:CNVD-2020-16658

Trust: 0.6

db:AUSCERTid:ESB-2020.0424.6

Trust: 0.6

db:AUSCERTid:ESB-2020.0424.5

Trust: 0.6

db:AUSCERTid:ESB-2020.0424.3

Trust: 0.6

db:AUSCERTid:ESB-2020.0424.7

Trust: 0.6

db:AUSCERTid:ESB-2020.0424.9

Trust: 0.6

db:NSFOCUSid:45776

Trust: 0.6

db:CNNVDid:CNNVD-202002-127

Trust: 0.6

db:OTHERid:NONE

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2020-16658 // JVNDB: JVNDB-2020-001686 // PACKETSTORM: 156203 // CNNVD: CNNVD-202002-127 // NVD: CVE-2020-3110

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20200205-ipcameras-rce-dos

Trust: 2.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-3110

Trust: 2.1

url:http://packetstormsecurity.com/files/156203/cisco-discovery-protocol-cdp-remote-device-takeover.html

Trust: 1.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-3110

Trust: 0.8

url:https://jvn.jp/vu/jvnvu95679983/

Trust: 0.8

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20200205-voip-phones-rce-dos

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20200205-iosxr-cdp-rce

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20200205-fxnxos-iosxr-cdp-dos

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20200205-nxos-cdp-rce

Trust: 0.6

url:http://www.nsfocus.net/vulndb/45776

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.0424.9/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.0424.7/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.0424.6/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.0424.5/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.0424.3/

Trust: 0.6

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-3111

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-3120

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-3118

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-3119

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2020-16658 // JVNDB: JVNDB-2020-001686 // PACKETSTORM: 156203 // CNNVD: CNNVD-202002-127 // NVD: CVE-2020-3110

CREDITS

Yuval Sarel,Barak Hadad, Ben Seri

Trust: 0.6

sources: CNNVD: CNNVD-202002-127

SOURCES

db:OTHERid: -
db:CNVDid:CNVD-2020-16658
db:JVNDBid:JVNDB-2020-001686
db:PACKETSTORMid:156203
db:CNNVDid:CNNVD-202002-127
db:NVDid:CVE-2020-3110

LAST UPDATE DATE

2025-01-30T22:13:23.531000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-16658date:2020-03-11T00:00:00
db:JVNDBid:JVNDB-2020-001686date:2020-02-21T00:00:00
db:CNNVDid:CNNVD-202002-127date:2021-01-05T00:00:00
db:NVDid:CVE-2020-3110date:2024-11-21T05:30:20.743

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-16658date:2020-03-11T00:00:00
db:JVNDBid:JVNDB-2020-001686date:2020-02-21T00:00:00
db:PACKETSTORMid:156203date:2020-02-05T17:05:56
db:CNNVDid:CNNVD-202002-127date:2020-02-05T00:00:00
db:NVDid:CVE-2020-3110date:2020-02-05T18:15:10.673