First published: Fri Dec 21 2012(Updated: )
The web interface on (1) Foscam and (2) Wansview IP cameras allows remote attackers to bypass authentication, and perform administrative functions or read the admin password, via a direct request to an unspecified URL.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Foscam H.264 Hi3510/11/12 IP Camera | ||
Wansview H.264 Hi3510/11/12 Ip Camera |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3002 is considered a high severity vulnerability due to its authentication bypass nature.
To fix CVE-2012-3002, update your Foscam or Wansview IP camera firmware to the latest version provided by the manufacturer.
CVE-2012-3002 affects Foscam and Wansview H.264 Hi3510/11/12 IP cameras.
Exploiting CVE-2012-3002 allows remote attackers to perform unauthorized administrative functions and access sensitive information.
Monitoring access logs for unusual URL requests can help detect attempts to exploit CVE-2012-3002.