First published: Fri Nov 02 2018(Updated: )
An exploitable firmware downgrade vulnerability exists in the time syncing functionality of Yi Home Camera 27US 1.8.7.0D. A specially crafted packet can cause a buffer overflow, resulting in code execution. An attacker can intercept and alter network traffic to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Yitechnology Yi Home Camera Firmware | =1.8.7.0d | |
Yitechnology Yi Home Camera Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-3892 is rated as high severity due to the potential for code execution through a buffer overflow.
To mitigate CVE-2018-3892, update the Yi Home Camera firmware to a version that is not vulnerable to the downgrade exploit.
An attacker could exploit CVE-2018-3892 by intercepting and altering network traffic to send a specially crafted packet to the device.
CVE-2018-3892 specifically affects the Yi Home Camera firmware version 1.8.7.0D.
Yes, CVE-2018-3892 is a remote vulnerability that can be exploited over the network.