ID

VAR-201804-0561


CVE

CVE-2017-2871


TITLE

Foscam C1 Indoor HD Camera Authentication vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-013275

DESCRIPTION

Insufficient security checks exist in the recovery procedure used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. An attacker who is in the same subnetwork of the camera or has remote administrator access can fully compromise the device by performing a firmware recovery using a custom image. Foscam C1 Indoor HD Camera Contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. FoscamC1IndoorHDCamera is a wireless HD IP camera from China Foscam. A security vulnerability exists in the recovery process used in FoscamC1IndoorHDCamera, which is caused by a program that does not adequately perform security checks. ### Tested Versions Foscam Indoor IP Camera C1 Series System Firmware Version: 1.9.3.18 Application Firmware Version: 2.52.2.43 Plug-In Version: 3.3.0.26 ### Product URLs http://www.foscam.com/downloads/index.html ### CVSSv3 Score 9.6 - CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H ### CWE CWE-287: Improper Authentication ### Details Foscam produces a series of IP-capable surveillance devices, network video recorders, and baby monitors for the end-user. Foscam produces a range of cameras for both indoor and outdoor use and with wireless capability. One of these models is the C1 series which contains a web-based user interface for management and is based on..

Trust: 2.34

sources: NVD: CVE-2017-2871 // JVNDB: JVNDB-2017-013275 // CNVD: CNVD-2018-09719 // VULHUB: VHN-111074 // VULMON: CVE-2017-2871

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2018-09719

AFFECTED PRODUCTS

vendor:foscammodel:c1scope:eqversion:2.52.2.43

Trust: 1.6

vendor:foscammodel:c1 indoor hd camerascope:eqversion:2.52.2.43

Trust: 0.8

vendor:foscammodel:indoor ip camera c1 seriesscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2018-09719 // JVNDB: JVNDB-2017-013275 // CNNVD: CNNVD-201804-789 // NVD: CVE-2017-2871

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-2871
value: HIGH

Trust: 1.0

talos-cna@cisco.com: CVE-2017-2871
value: CRITICAL

Trust: 1.0

NVD: CVE-2017-2871
value: HIGH

Trust: 0.8

CNVD: CNVD-2018-09719
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201804-789
value: HIGH

Trust: 0.6

VULHUB: VHN-111074
value: MEDIUM

Trust: 0.1

VULMON: CVE-2017-2871
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-2871
severity: MEDIUM
baseScore: 5.8
vectorString: AV:A/AC:L/AU:N/C:P/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2018-09719
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-111074
severity: MEDIUM
baseScore: 5.8
vectorString: AV:A/AC:L/AU:N/C:P/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-2871
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

talos-cna@cisco.com: CVE-2017-2871
baseSeverity: CRITICAL
baseScore: 9.6
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 6.0
version: 3.0

Trust: 1.0

NVD: CVE-2017-2871
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2018-09719 // VULHUB: VHN-111074 // VULMON: CVE-2017-2871 // JVNDB: JVNDB-2017-013275 // CNNVD: CNNVD-201804-789 // NVD: CVE-2017-2871 // NVD: CVE-2017-2871

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.9

sources: VULHUB: VHN-111074 // JVNDB: JVNDB-2017-013275 // NVD: CVE-2017-2871

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-201804-789

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-201804-789

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-013275

PATCH

title:Top Pageurl:https://www.foscam.com/downloads/index.html

Trust: 0.8

sources: JVNDB: JVNDB-2017-013275

EXTERNAL IDS

db:TALOSid:TALOS-2017-0378

Trust: 3.2

db:NVDid:CVE-2017-2871

Trust: 3.2

db:JVNDBid:JVNDB-2017-013275

Trust: 0.8

db:CNVDid:CNVD-2018-09719

Trust: 0.6

db:CNNVDid:CNNVD-201804-789

Trust: 0.6

db:SEEBUGid:SSVID-97305

Trust: 0.1

db:VULHUBid:VHN-111074

Trust: 0.1

db:VULMONid:CVE-2017-2871

Trust: 0.1

sources: CNVD: CNVD-2018-09719 // VULHUB: VHN-111074 // VULMON: CVE-2017-2871 // JVNDB: JVNDB-2017-013275 // CNNVD: CNNVD-201804-789 // NVD: CVE-2017-2871

REFERENCES

url:https://talosintelligence.com/vulnerability_reports/talos-2017-0378

Trust: 3.2

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-2871

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-2871

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/287.html

Trust: 0.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/141772

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2018-09719 // VULHUB: VHN-111074 // VULMON: CVE-2017-2871 // JVNDB: JVNDB-2017-013275 // CNNVD: CNNVD-201804-789 // NVD: CVE-2017-2871

SOURCES

db:CNVDid:CNVD-2018-09719
db:VULHUBid:VHN-111074
db:VULMONid:CVE-2017-2871
db:JVNDBid:JVNDB-2017-013275
db:CNNVDid:CNNVD-201804-789
db:NVDid:CVE-2017-2871

LAST UPDATE DATE

2024-08-14T13:45:56.709000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-09719date:2018-05-17T00:00:00
db:VULHUBid:VHN-111074date:2018-05-22T00:00:00
db:VULMONid:CVE-2017-2871date:2018-05-22T00:00:00
db:JVNDBid:JVNDB-2017-013275date:2018-06-18T00:00:00
db:CNNVDid:CNNVD-201804-789date:2022-04-20T00:00:00
db:NVDid:CVE-2017-2871date:2022-06-07T17:24:40.237

SOURCES RELEASE DATE

db:CNVDid:CNVD-2018-09719date:2018-05-17T00:00:00
db:VULHUBid:VHN-111074date:2018-04-17T00:00:00
db:VULMONid:CVE-2017-2871date:2018-04-17T00:00:00
db:JVNDBid:JVNDB-2017-013275date:2018-06-18T00:00:00
db:CNNVDid:CNNVD-201804-789date:2018-04-18T00:00:00
db:NVDid:CVE-2017-2871date:2018-04-17T20:29:00.223