Advertisement






QBee MultiSensor Camera 4.16.4 Cookie Reuse

CVE Category Price Severity
CVE-2018-16225 CWE-310 $10,000 High
Author Risk Exploitation Type Date
Unknown High Remote 2018-09-18
CPE
cpe:cpe:/h:qbee:multisensor_camera:4.16.4
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2018090162

Below is a copy:

QBee MultiSensor Camera 4.16.4 Cookie Reuse
The QBee MultiSensor Camera through 4.16.4 accepts unencrypted network traffic from clients (such as the QBee Cam application through 1.0.5 for Android and the Swisscom Home application up to 10.7.2 for Android), which results in an attacker being able to reuse cookies to bypass authentication and disable the camera.
 
[VulnerabilityType Other]
 Auth bypass using cookie
 
[Vendor of Product]
 QBee, Vestiacom, Swisscom
 
[Affected Product Code Base]
 QBee MultiSensor Camera <= 4.16.4
 QBee Cam (Android) <= 1.0.5 (Fixed version number not yet available)
 QBee Cam (iOS) < 1.5.2
 Swisscom Home App (Android) < 10.7.2
 Swisscom Home App (iOS) < 10.9.0
 
[Affected Component]
 Network Traffic
 
[Attack Type]
 Remote
 
[Impact Denial of Service]
 true
 
[Impact Information Disclosure]
 true
 
[Attack Vectors]
 Reuse of intercepted cookies to authorize requests to camera and disable it
 
[Has vendor confirmed or acknowledged the vulnerability?]
 true
 
[Discoverer]
 Francesco Servida (University of Lausanne)
 
[Reference]
 https://francescoservida.ch/
 https://blog.francescoservida.ch/2018/09/16/cve-2018-16225-public-disclosure-qbee-camera-vulnerability
 https://unil.ch/esc/

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum