Risk | High |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2018-6830 CVE-2018-6831 CVE-2018-6832 |
CWE-ID | CWE-20 CWE-78 CWE-121 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
IP Video Camera Firmware Hardware solutions / Firmware |
Vendor | Foscam |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU13268
Risk: Low
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-6830
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to delete arbitrary files on the target system.
The vulnerability exists due to a flaw in the Web management interface when handling malicious input. A remote unauthenticated attacker can send a specially crafted HTTP GET request, bypass security restrictions and delete arbitrary files from the system.
MitigationInstall update from vendor's website.
IP Video Camera Firmware: All versions
CPE2.3 External linkshttps://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU13269
Risk: High
CVSSv4.0: 6.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2018-6831
CWE-ID:
CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote authenticated attacker to execute arbitrary shell commands on the target system.
The vulnerability exists due to a flaw in the FastCGI API when handling malicious input. A remote unauthenticated attacker can send a specially crafted request to inject and execute arbitrary shell commands with root privileges
Successful exploitation of the vulnerability may result in system compromise.
Install update from vendor's website.
IP Video Camera Firmware: All versions
CPE2.3 External linkshttps://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU13270
Risk: Low
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-6832
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition on the target system.
The vulnerability exists due to stack-based buffer overflow in the FastCGI API when handling malicious input. A remote unauthenticated attacker can send a specially crafted HTTP GET request, trigger memory corruption and cause the device's webService process to crash.
MitigationInstall update from vendor's website.
IP Video Camera Firmware: All versions
CPE2.3 External linkshttps://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.