Three Vulnerabilities Found in Foscam IP Cameras (CVE-2018-6830)

Three vulnerabilities have been found in Foscam security cameras. Owners of such cameras are urged to update as soon as possible. The flaws are described as an arbitrary file-deletion bug, a shell command-injection bug and a stack-based buffer oferflow vulnerability. The bugs were discovered by researchers at VDOO.

During their research, the experts came across zero-day vulnerabilities in devices of several vendors. These vulnerabilities were disclosed to the vendors, according to the responsible disclosure best practices, and will be shared gradually after the disclosure periods are concluded, the researchers said.

In terms of the vulnerabilities in Foscam products, a critical chain of flaws has been unearthed:

Combining the discovered vulnerabilities, an adversary who successfully obtains the address of the camera, can remotely gain root access to the cameras (via LAN or internet). VDOO has responsibly disclosed these vulnerabilities (CVE-2018-6830, CVE-2018-6831 and CVE-2018-6832) and engaged with Foscam’s security team to solve the matter.

The security team believes that the vulnerabilities have not been exploited in active attacks. In addition, it appears that the Foscam team acted promptly to patch the three bugs and push them to their exposed customers.

More about CVE-2018-6830, CVE-2018-6831 and CVE-2018-6832

An attack exploiting the bugs would revolve around a process in the cameras known as webService. The process receives requests from servers and can be deployed to verify the user’s credentials. It can also run the handler for the particular API command.

The first step of an attack involves an attack getting access to the vulnerable camera’s IP address or DNS name. This may not be difficult at all, depending on the circumstance, more specifically – if the camera has direct interface to the internet.

The second step is the attacker crashing the webService process by (Read more...)

*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum authored by Milena Dimitrova. Read the original post at: