First published: Mon Sep 26 2022(Updated: )
ieGeek IG20 hipcam RealServer V1.0 is vulnerable to Incorrect Access Control. The algorithm used to generate device IDs (UIDs) for devices that utilize Shenzhen Yunni Technology iLnkP2P suffers from a predictability flaw that allows remote attackers to establish direct connections to arbitrary devices.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ieGeek IG20 | ||
IeGeek IG20 Firmware | ||
RealNetworks RealServer | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-38970 is rated as a high severity vulnerability due to incorrect access control allowing unauthorized remote connections.
To fix CVE-2022-38970, it is recommended to update the ieGeek IG20 firmware to the latest version provided by the vendor.
Users of ieGeek IG20 firmware and devices using Shenzhen Yunni Technology iLnkP2P for device ID generation are affected by CVE-2022-38970.
Yes, CVE-2022-38970 can be exploited remotely, allowing attackers to establish connections to arbitrary devices.
CVE-2022-38970 is an access control vulnerability that reveals a predictability flaw in the generation of device IDs.