CVE-2018-16225

The QBee MultiSensor Camera through 4.16.4 accepts unencrypted network traffic from clients (such as the QBee Cam application through 1.0.5 for Android and the Swisscom Home application up to 10.7.2 for Android), which results in an attacker being able to reuse cookies to bypass authentication and disable the camera.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:qbeecam:qbee_multi-sensor_camera_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:qbeecam:qbee_multi-sensor_camera:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:qbeecam:qbeecam:*:*:*:*:*:android:*:*
cpe:2.3:a:swisscom:swisscom_home_app:*:*:*:*:*:android:*:*

History

No history.

Information

Published : 2018-09-18 21:29

Updated : 2024-02-04 20:03


NVD link : CVE-2018-16225

Mitre link : CVE-2018-16225

CVE.ORG link : CVE-2018-16225


JSON object : View

Products Affected

qbeecam

  • qbeecam
  • qbee_multi-sensor_camera
  • qbee_multi-sensor_camera_firmware

swisscom

  • swisscom_home_app
CWE
CWE-319

Cleartext Transmission of Sensitive Information