First published: Sun Mar 17 2019(Updated: )
Sricam IP CCTV cameras are vulnerable to denial of service via multiple incomplete HTTP requests because the web server (based on gSOAP 2.8.x) is configured for an iterative queueing approach (aka non-threaded operation) with a timeout of several seconds.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Genivia gSOAP | =2.8.0 | |
Sricam Nvs001 | ||
Sricam Sh016 | ||
Sricam Sh024 | ||
Sricam Sh026 | ||
Sricam Sh027 | ||
Sricam Sp007 | ||
Sricam Sp008 | ||
Sricam Sp009 | ||
Sricam Sp012 | ||
Sricam Sp015 | ||
Sricam Sp017 | ||
Sricam Sp018 | ||
Sricam Sp019 | ||
Sricam Sp020 | ||
Sricam Sp023 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-6973 is a vulnerability that affects Sricam IP CCTV cameras, allowing attackers to perform a denial of service attack through multiple incomplete HTTP requests.
CVE-2019-6973 exploits the configuration of the web server (based on gSOAP 2.8.x) used by Sricam IP CCTV cameras, which is configured for an iterative queueing approach with a timeout of several seconds. Attackers can send multiple incomplete HTTP requests to overwhelm the server and cause a denial of service.
CVE-2019-6973 has a severity rating of 7.5 (High).
The vulnerability affects Sricam IP CCTV cameras with the following software: Genivia gSOAP 2.8.0.
To mitigate CVE-2019-6973, it is recommended to update the firmware of the Sricam IP CCTV cameras with the latest patches provided by the manufacturer.