{ "id": "CVE-2017-17101", "sourceIdentifier": "cve@mitre.org", "published": "2018-02-19T19:29:00.657", "lastModified": "2019-10-03T00:03:26.223", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Apexis APM-H803-MPC software, as used with many different models of IP Camera. An unprotected CGI method inside the web application permits an unauthenticated user to bypass the login screen and access the webcam contents including: live video stream, configuration files with all the passwords, system information, and much more. With this vulnerability, anyone can access to a vulnerable webcam with 'super admin' privilege." }, { "lang": "es", "value": "Se ha descubierto un problema en el software Apexis APM-H803-MPC utilizado con muchos modelos diferentes de c\u00e1mara IP. Un m\u00e9todo CGI no protegido dentro de la aplicaci\u00f3n web permite que usuario no autenticado omita la pantalla de inicio de sesi\u00f3n y acceda a los contenidos de la webcam, incluyendo emisiones en directo, archivos de configuraci\u00f3n con todas las contrase\u00f1as, informaci\u00f3n del sistema y mucho m\u00e1s. Con esta vulnerabilidad, cualquiera puede acceder a una webcam vulnerable con privilegio \"super admin\"." } ], "metrics": { "cvssMetricV30": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 7.5 }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ], "configurations": [ { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:apexis:apm-h803-mpc_firmware:1.1.2.69:*:*:*:*:*:*:*", "matchCriteriaId": "70927042-AC5D-420D-AC46-450F0696A3BF" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:apexis:apm-h803-mpc:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE434DF1-49F2-4390-82B1-9DBD8BCFD474" } ] } ] } ], "references": [ { "url": "https://youtu.be/B75C13Zw35Y", "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ] } ] }