Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2020-29001 Explained : Impact and Mitigation

Discover the security vulnerability in Geeni GNC-CW028 Camera, Geeni GNC-CW025 Doorbell, Merkury MI-CW024 Doorbell, and Merkury MI-CW017 Camera devices. Learn how to mitigate the risk and secure your devices.

An issue was discovered on Geeni GNC-CW028 Camera 2.7.2, Geeni GNC-CW025 Doorbell 2.9.5, Merkury MI-CW024 Doorbell 2.9.6, and Merkury MI-CW017 Camera 2.9.6 devices. A vulnerability exists in the RESTful Services API that allows a remote attacker to take full control of the camera with a high-privileged account. The vulnerability exists because a static username and password are compiled into the ppsapp RESTful application.

Understanding CVE-2020-29001

This CVE identifies a security vulnerability in multiple Geeni and Merkury devices that could be exploited by a remote attacker to gain unauthorized access.

What is CVE-2020-29001?

The vulnerability in the RESTful Services API of the affected devices enables a malicious actor to achieve complete control over the camera using a high-privileged account.

The Impact of CVE-2020-29001

The presence of hardcoded credentials in the ppsapp RESTful application poses a severe risk as it allows unauthorized individuals to compromise the camera's security and privacy.

Technical Details of CVE-2020-29001

The following technical aspects provide more insight into the CVE.

Vulnerability Description

The vulnerability stems from hardcoded credentials in the RESTful Services API, facilitating unauthorized access to the camera.

Affected Systems and Versions

        Geeni GNC-CW028 Camera 2.7.2
        Geeni GNC-CW025 Doorbell 2.9.5
        Merkury MI-CW024 Doorbell 2.9.6
        Merkury MI-CW017 Camera 2.9.6

Exploitation Mechanism

The flaw allows remote attackers to exploit the static username and password compiled into the ppsapp RESTful application to gain full control of the camera.

Mitigation and Prevention

Protecting against CVE-2020-29001 requires immediate actions and long-term security measures.

Immediate Steps to Take

        Disable remote access to the affected devices if not required
        Change default passwords and implement strong, unique credentials
        Regularly monitor device logs for suspicious activities

Long-Term Security Practices

        Keep devices up to date with the latest firmware and security patches
        Implement network segmentation to isolate IoT devices
        Conduct regular security audits and penetration testing

Patching and Updates

        Check for firmware updates from the device manufacturer
        Apply patches promptly to address security vulnerabilities

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now