// For flags

CVE-2014-1849

Foscam IP Camera - Predictable Credentials Security Bypass

Severity Score

10.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Foscam IP camera 11.37.2.49 and other versions, when using the Foscam DynDNS option, generates credentials based on predictable camera subdomain names, which allows remote attackers to spoof or hijack arbitrary cameras and conduct other attacks by modifying arbitrary camera records in the Foscam DNS server.

Foscam IP Camera 11.37.2.49 y otras versiones, cuando utiliza la opciĆ³n Foscam DynDNS, genera credenciales basados en nombres de subdominio de camera previsibles, lo que permite a atacantes remotos falsificar o secuestrar cameras arbitrarias y realizar otros ataques mediante la modificaciĆ³n de registros de camera arbitrarios en el servidor Foscam DNS.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2014-02-02 CVE Reserved
  • 2014-05-08 First Exploit
  • 2014-05-09 CVE Published
  • 2024-08-06 CVE Updated
  • 2024-11-29 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-255: Credentials Management Errors
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Foscam
Search vendor "Foscam"
Ip Camera Firmware
Search vendor "Foscam" for product "Ip Camera Firmware"
11.37.2.49
Search vendor "Foscam" for product "Ip Camera Firmware" and version "11.37.2.49"
-
Affected