Vulnerability Description
An issue was discovered on Foscam C2 devices with System Firmware 1.11.1.8 and Application Firmware 2.72.1.32, and Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. The FTP and RTSP services make it easier for attackers to conduct brute-force authentication attacks, because failed-authentication limits apply only to HTTP (not FTP or RTSP).
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Opticam | I5 Application Firmware | 2.21.1.128 |
| Opticam | I5 System Firmware | 1.5.2.11 |
| Opticam | I5 | - |
| Foscam | C2 Application Firmware | 2.72.1.32 |
| Foscam | C2 System Firmware | 1.11.1.8 |
| Foscam | C2 | - |
Related Weaknesses (CWE)
References
- https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txtExploitThird Party Advisory
- https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txtExploitThird Party Advisory
FAQ
What is CVE-2018-19076?
CVE-2018-19076 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An issue was discovered on Foscam C2 devices with System Firmware 1.11.1.8 and Application Firmware 2.72.1.32, and Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128....
How severe is CVE-2018-19076?
CVE-2018-19076 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-19076?
Check the references section above for vendor advisories and patch information. Affected products include: Opticam I5 Application Firmware, Opticam I5 System Firmware, Opticam I5, Foscam C2 Application Firmware, Foscam C2 System Firmware.