{"vuid":"VU#265532","idnumber":"265532","name":"Multi-vendor IP camera web interface authentication bypass","keywords":["authentication bypass","ip","camera","web"],"overview":"The web interface firmware for Foscam and Wansview H.264 Hi3510/11/12 IP cameras contain an authentication bypass vulnerability. Other vendors that share the same base firmware image are also vulnerable.","clean_desc":"It has been reported that the web interface for IP cameras from several vendors including Foscam and Wansview contain an authentication bypass vulnerability. By visiting specific URLs, an attacker may be able to perform any function a normal user can. The admin password is also leaked through client side Javascript.","impact":"A remote unauthenticated attacker may be able to execute any command available to the web interface including full administrative functions.","resolution":"Apply an Update Foscam has released firmware updates to address this vulnerability. Users should upgrade to the latest firmware version available for their camera. If patches are not available from the vendor, please consider the following workaround.","workarounds":"Restrict Access Appropriate firewall rules should be put in place so only trusted users can access the web interface.","sysaffected":"","thanks":"Thanks to Don Kennedy for reporting this vulnerability.","author":"This document was written by Jared Allar.","public":["http://www.foscam.com/","http://wansview.net/","http://foscam.us/forum/h264-ip-camera-web-interface-authentication-bypass-test-tool-t3252.html"],"cveids":["CVE-2012-3002"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2012-08-23T00:53:56Z","publicdate":"2012-10-08T00:00:00Z","datefirstpublished":"2012-10-10T20:01:09Z","dateupdated":"2012-10-23T14:05:07Z","revision":22,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"tcp","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"C","cvss_integrityimpact":"C","cvss_availabilityimpact":"P","cvss_exploitablity":null,"cvss_remediationlevel":"U","cvss_reportconfidence":"UC","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"ND","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"9.7","cvss_basevector":"AV:N/AC:L/Au:N/C:C/I:C/A:P","cvss_temporalscore":"7.9","cvss_environmentalscore":"7.9","cvss_environmentalvector":"CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}