First published: Wed Nov 07 2018(Updated: )
An issue was discovered on Foscam C2 devices with System Firmware 1.11.1.8 and Application Firmware 2.72.1.32, and Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. The FTP and RTSP services make it easier for attackers to conduct brute-force authentication attacks, because failed-authentication limits apply only to HTTP (not FTP or RTSP).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Opticam I5 Application Firmware | =2.21.1.128 | |
Opticam I5 System Firmware | =1.5.2.11 | |
Opticam i5 | ||
Foscam C2 System Firmware | =2.72.1.32 | |
Foscam C2 Firmware | =1.11.1.8 | |
Foscam C2 System Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-19076 has been categorized as a moderate severity vulnerability due to its potential to allow brute-force authentication attacks.
To remediate CVE-2018-19076, users should update their Foscam C2 or Opticam i5 devices to the latest available firmware versions.
CVE-2018-19076 affects Foscam C2 devices with System Firmware 1.11.1.8 and Application Firmware 2.72.1.32, and Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128.
If exploited, CVE-2018-19076 can lead to unauthorized access to the affected devices through brute-force authentication.
Yes, the FTP and RTSP services in Foscam C2 and Opticam i5 devices increase the risk of remote access exploitation as described in CVE-2018-19076.