SB2018061207 - Multiple vulnerabilities in Foscam IP Video Cameras



SB2018061207 - Multiple vulnerabilities in Foscam IP Video Cameras

Published: June 12, 2018

Security Bulletin ID SB2018061207
Severity
High
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 33% Low 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Improper input validation (CVE-ID: CVE-2018-6830)

The vulnerability allows a remote attacker to delete arbitrary files on the target system.

The vulnerability exists due to a flaw in the Web management interface when handling malicious input. A remote unauthenticated attacker can send a specially crafted HTTP GET request, bypass security restrictions and delete arbitrary files from the system.


2) OS command injection (CVE-ID: CVE-2018-6831)

The vulnerability allows a remote authenticated attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to a flaw in the FastCGI API when handling malicious input. A remote unauthenticated attacker can send a specially crafted request to inject and execute arbitrary shell commands with root privileges

Successful exploitation of the vulnerability may result in system compromise.


3) Stack-based buffer overflow (CVE-ID: CVE-2018-6832)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The vulnerability exists due to stack-based buffer overflow in the FastCGI API when handling malicious input. A remote unauthenticated attacker can send a specially crafted HTTP GET request, trigger memory corruption and cause the device's webService process to crash.


Remediation

Install update from vendor's website.