Description
Foscam VD1 Video Doorbell before V5.3.13_1072 is vulnerable to Cleartext Transmission of Sensitive Information. The device transmits sensitive Session Description Protocol (SDP), including ICE credentials and candidates, in cleartext over network interfaces. An attacker with network visibility can intercept these credentials to hijack media streams or authenticate to Foscam's TURN/relay infrastructure to forward arbitrary traffic at the vendor's expense.
Published: 2026-05-14
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability allows a device to send Session Description Protocol messages, including ICE credentials and candidates, in cleartext over the network. An attacker with network visibility can capture these credentials, giving them the ability to hijack video streams or authenticate to the vendor’s TURN/relay infrastructure and relay arbitrary traffic, potentially leading to unauthorized access and service disruption. The weakness exposes confidential authentication data and allows integrity compromise of media sessions.

Affected Systems

Foscam VD1 Video Doorbell firmware versions prior to V5.3.13_1072 are affected. The issue exists on all network interfaces that transmit SDP messages during media negotiation.

Risk and Exploitability

The CVSS score is 5.3 and the EPSS score is <1%, indicating a moderate risk severity and low likelihood of exploitation, yet the flaw remains exploitable by any actor with network visibility to the device. The absence of KEV listing does not eliminate risk, as the vulnerability enables active credential interception and hijacking. An attacker can directly intercept credentials, then use them to authenticate to external TURN services and forward traffic, potentially incurring costs and exposing sensitive traffic.

Generated by OpenCVE AI on May 15, 2026 at 17:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the device firmware to version V5.3.13 or later, which removes the exposure of session credentials
  • If an immediate firmware update is not possible, restrict network interfaces or apply firewall rules to block that carries Session Description Protocol messages to reduce the opportunity for interception
  • Consider configuring the device to use secure transport mechanisms (TLS/DTLS) for media negotiation if supported by the vendor

Generated by OpenCVE AI on May 15, 2026 at 17:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 15 May 2026 18:15:00 +0000

Type Values Removed Values Added
Title Cleartext Transmission of Session Credentials in Foscam VD1 Video Doorbell

Fri, 15 May 2026 16:15:00 +0000

Type Values Removed Values Added
Title Cleartext Transmission of Session Credentials in Foscam VD1 Video Doorbell Firmware
Weaknesses CWE-200

Fri, 15 May 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-319
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 14 May 2026 20:45:00 +0000

Type Values Removed Values Added
Title Cleartext Transmission of Session Credentials in Foscam VD1 Video Doorbell Firmware
Weaknesses CWE-200

Thu, 14 May 2026 19:00:00 +0000

Type Values Removed Values Added
Description Foscam VD1 Video Doorbell before V5.3.13_1072 is vulnerable to Cleartext Transmission of Sensitive Information. The device transmits sensitive Session Description Protocol (SDP), including ICE credentials and candidates, in cleartext over network interfaces. An attacker with network visibility can intercept these credentials to hijack media streams or authenticate to Foscam's TURN/relay infrastructure to forward arbitrary traffic at the vendor's expense.
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-15T13:35:54.467Z

Reserved: 2026-04-06T00:00:00.000Z

Link: CVE-2026-38740

cve-icon Vulnrichment

Updated: 2026-05-15T13:35:50.259Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-14T19:16:32.903

Modified: 2026-05-15T15:16:51.323

Link: CVE-2026-38740

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T18:00:05Z

Weaknesses