CVE-2017-10719

Recently it was discovered as a part of the research on IoT devices in the most recent firmware for Shekar Endoscope that the device has default Wi-Fi credentials that are exactly the same for every device. This device acts as an Endoscope camera that allows its users to use it in various industrial systems and settings, car garages, and also in some cases in the medical clinics to get access to areas that are difficult for a human being to reach. Any breach of this system can allow an attacker to get access to video feed and pictures viewed by that user and might allow them to get a foot hold in air gapped networks especially in case of nation critical infrastructure/industries.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:ishekar:endoscope_camera_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:ishekar:endoscope_camera:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:06

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/153241/Shekar-Endoscope-Weak-Default-Settings-Memory-Corruption.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/153241/Shekar-Endoscope-Weak-Default-Settings-Memory-Corruption.html - Third Party Advisory, VDB Entry
References () https://github.com/ethanhunnt/IoT_vulnerabilities/blob/master/Shekar_boriscope_sec_issues.pdf - Exploit, Third Party Advisory () https://github.com/ethanhunnt/IoT_vulnerabilities/blob/master/Shekar_boriscope_sec_issues.pdf - Exploit, Third Party Advisory
References () https://seclists.org/bugtraq/2019/Jun/8 - Mailing List, Third Party Advisory () https://seclists.org/bugtraq/2019/Jun/8 - Mailing List, Third Party Advisory

Information

Published : 2019-06-17 22:15

Updated : 2024-11-21 03:06


NVD link : CVE-2017-10719

Mitre link : CVE-2017-10719

CVE.ORG link : CVE-2017-10719


JSON object : View

Products Affected

ishekar

  • endoscope_camera
  • endoscope_camera_firmware
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor