Impact
The vulnerability allows a device to send Session Description Protocol messages, including ICE credentials and candidates, in cleartext over the network. An attacker with network visibility can capture these credentials, giving them the ability to hijack video streams or authenticate to the vendor’s TURN/relay infrastructure and relay arbitrary traffic, potentially leading to unauthorized access and service disruption. The weakness exposes confidential authentication data and allows integrity compromise of media sessions.
Affected Systems
Foscam VD1 Video Doorbell firmware versions prior to V5.3.13_1072 are affected. The issue exists on all network interfaces that transmit SDP messages during media negotiation.
Risk and Exploitability
The CVSS score is 5.3 and the EPSS score is <1%, indicating a moderate risk severity and low likelihood of exploitation, yet the flaw remains exploitable by any actor with network visibility to the device. The absence of KEV listing does not eliminate risk, as the vulnerability enables active credential interception and hijacking. An attacker can directly intercept credentials, then use them to authenticate to external TURN services and forward traffic, potentially incurring costs and exposing sensitive traffic.
OpenCVE Enrichment