Discover the security vulnerability in Geeni GNC-CW028 Camera, Geeni GNC-CW025 Doorbell, Merkury MI-CW024 Doorbell, and Merkury MI-CW017 Camera devices. Learn how to mitigate the risk and secure your devices.
An issue was discovered on Geeni GNC-CW028 Camera 2.7.2, Geeni GNC-CW025 Doorbell 2.9.5, Merkury MI-CW024 Doorbell 2.9.6, and Merkury MI-CW017 Camera 2.9.6 devices. A vulnerability exists in the RESTful Services API that allows a remote attacker to take full control of the camera with a high-privileged account. The vulnerability exists because a static username and password are compiled into the ppsapp RESTful application.
Understanding CVE-2020-29001
This CVE identifies a security vulnerability in multiple Geeni and Merkury devices that could be exploited by a remote attacker to gain unauthorized access.
What is CVE-2020-29001?
The vulnerability in the RESTful Services API of the affected devices enables a malicious actor to achieve complete control over the camera using a high-privileged account.
The Impact of CVE-2020-29001
The presence of hardcoded credentials in the ppsapp RESTful application poses a severe risk as it allows unauthorized individuals to compromise the camera's security and privacy.
Technical Details of CVE-2020-29001
The following technical aspects provide more insight into the CVE.
Vulnerability Description
The vulnerability stems from hardcoded credentials in the RESTful Services API, facilitating unauthorized access to the camera.
Affected Systems and Versions
Exploitation Mechanism
The flaw allows remote attackers to exploit the static username and password compiled into the ppsapp RESTful application to gain full control of the camera.
Mitigation and Prevention
Protecting against CVE-2020-29001 requires immediate actions and long-term security measures.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates