First published: Fri Sep 25 2020(Updated: )
The Telnet service of Rubetek cameras RV-3406, RV-3409, and RV-3411 cameras (firmware versions v342, v339) could allow an remote attacker to take full control of the device with a high-privileged account. The vulnerability exists because a system account has a default and static password. The Telnet service cannot be disabled and this password cannot be changed via standard functionality.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rubetek RV-3406 | =339 | |
Rubetek RV-3406 | =342 | |
Rubetek Rv-3406 Firmware | ||
Rubetek Rv-3409 Firmware | =339 | |
Rubetek Rv-3409 Firmware | =342 | |
Rubetek Rv-3409 Firmware | ||
Rubetek RV-3411 | =339 | |
Rubetek RV-3411 | =342 | |
Rubetek Rv-3411 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25749 is considered to be of high severity due to the ability of remote attackers to gain full control of vulnerable Rubetek cameras.
To fix CVE-2020-25749, change the default Telnet password for Rubetek cameras RV-3406, RV-3409, and RV-3411 to a strong, unique password.
The affected models by CVE-2020-25749 are Rubetek RV-3406, RV-3409, and RV-3411 running specific firmware versions.
CVE-2020-25749 is caused by a system account on Rubetek cameras that has a default and static password allowing unauthorized access.
You should immediately update the firmware and change the Telnet password for affected Rubetek camera models to mitigate CVE-2020-25749.