Foscam IP camera 11.37.2.49 and other versions, when using the Foscam DynDNS option, generates credentials based on predictable camera subdomain names, which allows remote attackers to spoof or hijack arbitrary cameras and conduct other attacks by modifying arbitrary camera records in the Foscam DNS server.
References
Configurations
Information
Published : 2014-05-13 17:55
Updated : 2014-05-14 11:43
NVD link : CVE-2014-1849
Mitre link : CVE-2014-1849
JSON object : View
CWE
CWE-255
Credentials Management Errors
Products Affected
foscam
- ip_camera_firmware