{"vuid":"VU#525132","idnumber":"525132","name":"Foscam IP camera authentication bypass vulnerability","keywords":["CVE-2014-1911","CWE-592","foscam"],"overview":"The FI8910W Foscam IP camera running firmware version 11.37.2.54  fails to properly authenticate users.","clean_desc":"CWE-592: Authentication Bypass Issues - CVE-2014-1911\nThe FI8910W Foscam IP camera running firmware version 11.37.2.54 contains a vulnerability which allows an unauthenticated remote attacker to gain access to streaming video and image data. Other models and firmwares may be affected.","impact":"An unauthenticated remote attacker may be able to  gain privileged access to video and image data.","resolution":"Apply an Update Foscam advises users to upgrade to firmware 11.37.2.55. In addition, the following workaround is available:","workarounds":"Restrict Access\nAs a general good security practice, only allow connections from trusted hosts and networks. Appropriate firewall rules which block incoming connections from untrusted networks would likely prevent an external attacker from accessing the Foscam IP camera.","sysaffected":"","thanks":"Thanks to \nKK \"stiegl\" for reporting this vulnerability.","author":"This document was written by Todd Lewellen.","public":["http://foscam.us/","http://foscam.us/forum/mjpeg-54-firmware-bug-user-logon-bypass-t8442.html"],"cveids":["CVE-2014-1911"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2014-01-09T13:17:50Z","publicdate":"2014-03-03T00:00:00Z","datefirstpublished":"2014-03-03T19:25:32Z","dateupdated":"2014-03-03T19:25:37Z","revision":7,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"C","cvss_integrityimpact":"N","cvss_availabilityimpact":"N","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"L","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"7.8","cvss_basevector":"AV:N/AC:L/Au:N/C:C/I:N/A:N","cvss_temporalscore":"6.8","cvss_environmentalscore":"1.6935398424","cvss_environmentalvector":"CDP:ND/TD:L/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}