An issue was discovered on Alecto IVM-100 2019-11-12 devices. The device uses a custom UDP protocol to start and control video and audio services. The protocol has been partially reverse engineered. Based upon the reverse engineering, no password or username is ever transferred over this protocol. Thus, one can set up the camera connection feed with only the encoded UID. It is possible to set up sessions with the camera over the Internet by using the encoded UID and the custom UDP protocol, because authentication happens at the client side.
Metrics
Affected Vendors & Products
References
History
Fri, 08 Nov 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Alecto
Alecto ivm-100 Firmware |
|
Weaknesses | CWE-295 | |
CPEs | cpe:2.3:o:alecto:ivm-100_firmware:*:*:*:*:*:*:*:* | |
Vendors & Products |
Alecto
Alecto ivm-100 Firmware |
|
Metrics |
cvssV3_1
|
Thu, 07 Nov 2024 20:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An issue was discovered on Alecto IVM-100 2019-11-12 devices. The device uses a custom UDP protocol to start and control video and audio services. The protocol has been partially reverse engineered. Based upon the reverse engineering, no password or username is ever transferred over this protocol. Thus, one can set up the camera connection feed with only the encoded UID. It is possible to set up sessions with the camera over the Internet by using the encoded UID and the custom UDP protocol, because authentication happens at the client side. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-11-07T00:00:00
Updated: 2024-11-08T16:53:39.128Z
Reserved: 2020-02-17T00:00:00
Link: CVE-2019-20461
Vulnrichment
Updated: 2024-11-08T16:53:32.412Z
NVD
Status : Awaiting Analysis
Published: 2024-11-07T21:15:05.400
Modified: 2024-11-08T19:01:03.880
Link: CVE-2019-20461
Redhat
No data.