Vulnerability Description
Foscam IP camera 11.37.2.49 and other versions, when using the Foscam DynDNS option, generates credentials based on predictable camera subdomain names, which allows remote attackers to spoof or hijack arbitrary cameras and conduct other attacks by modifying arbitrary camera records in the Foscam DNS server.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Foscam | Ip Camera Firmware | 11.37.2.49 |
Related Weaknesses (CWE)
References
- http://blog.shekyan.com/2014/05/cve-2014-1849-foscam-dynamic-dns-predictable-cre
- http://seclists.org/fulldisclosure/2014/May/35
- https://github.com/artemharutyunyan/getmecamtool/blob/master/src/dnsmod.cExploit
- http://blog.shekyan.com/2014/05/cve-2014-1849-foscam-dynamic-dns-predictable-cre
- http://seclists.org/fulldisclosure/2014/May/35
- https://github.com/artemharutyunyan/getmecamtool/blob/master/src/dnsmod.cExploit
FAQ
What is CVE-2014-1849?
CVE-2014-1849 is a vulnerability with a CVSS score of 10.0 (HIGH). Foscam IP camera 11.37.2.49 and other versions, when using the Foscam DynDNS option, generates credentials based on predictable camera subdomain names, which allows remote attackers to spoof or hijack...
How severe is CVE-2014-1849?
CVE-2014-1849 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-1849?
Check the references section above for vendor advisories and patch information. Affected products include: Foscam Ip Camera Firmware.