The web interface on (1) Foscam and (2) Wansview IP cameras allows remote attackers to bypass authentication, and perform administrative functions or read the admin password, via a direct request to an unspecified URL.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://foscam.us/forum/h264-ip-camera-web-interface-authentication-bypass-test-tool-t3252.html - | |
References | () http://secunia.com/advisories/50950 - | |
References | () http://secunia.com/advisories/50966 - | |
References | () http://www.foscam.com/help.aspx?TypeId=11 - | |
References | () http://www.kb.cert.org/vuls/id/265532 - US Government Resource | |
References | () http://www.securityfocus.com/bid/55873 - |
Information
Published : 2012-12-21 11:47
Updated : 2024-11-21 01:40
NVD link : CVE-2012-3002
Mitre link : CVE-2012-3002
CVE.ORG link : CVE-2012-3002
JSON object : View
Products Affected
foscam
- h.264_hi3510\/11\/12_ip_camera
wansview
- h.264_hi3510\/11\/12_ip_camera
CWE
CWE-287
Improper Authentication