Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   


Try our Premium Alert Service
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Become a Partner and License Our Database or Notification Service

Category:   Device (Multimedia)  >   Cisco Video Surveillance Camera Vendors:   Cisco
Cisco Video Surveillance Cameras Use Static Certificates and Keys That Let Remote Users Decrypt Potentially Sensitive User Connections
SecurityTracker Alert ID:  1034256
SecurityTracker URL:
CVE Reference:   CVE-2015-6358   (Links to External Site)
Date:  Nov 26 2015
Impact:   Disclosure of system information, Disclosure of user information
Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Cisco Video Surveillance Cameras. A remote user can decrypt user connections to obtain potentially sensitive information in certain cases.

The system uses a hard-coded certificate and hard-coded keys to protect user connections. A remote user that can conduct a man-in-the-middle attack can use the static credentials to decrypt user connections and obtain potentially sensitive information.

The following models are affected:

WVC2300 Wireless-G Business Internet Video Camera - Audio
PVC2300 Business Internet Video Camera - Audio/PoE

The vendor has assigned bug IDs CSCuw46610, CSCuw46620, CSCuw46637, CSCuw46654, CSCuw46665, CSCuw46672, CSCuw46677, CSCuw46682, CSCuw46705, CSCuw46716, CSCuw46979, CSCuw47005, CSCuw47028, CSCuw47040, CSCuw47048, CSCuw47061, CSCuw90860, CSCuw90869, CSCuw90875, CSCuw90881, CSCuw90899, and CSCuw90913 to this vulnerability.

Stefan Viehbck from SEC Consult Vulnerability Lab reported this vulnerability.

Impact:   A remote user that can conduct a man-in-the-middle attack can decrypt user connections and obtain potentially sensitive information.
Solution:   No solution was available at the time of this entry.

The vendor's advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Access control error

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

Copyright 2018, LLC