OTPulse

Geutebruck IP Cameras

Act Now9.8ICS-CERT ICSA-18-079-01Mar 20, 2018
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary

Geutebruck IP cameras (TopLine TopFD-2125 and G-Cam/EFD-2250) contain multiple vulnerabilities including authentication bypass, SQL injection, command injection, and cross-site scripting. These flaws allow an attacker to remotely execute arbitrary commands on the camera without valid credentials. The vulnerabilities exist in the camera's web management interface.

What this means
What could happen
An attacker can remotely access these IP cameras without authentication and run arbitrary commands, potentially altering video feeds, disabling surveillance, or using the camera as a pivot point to attack other equipment on your network.
Who's at risk
This affects any facility using Geutebruck TopLine TopFD-2125 or G-Cam/EFD-2250 IP cameras for surveillance or monitoring. Water utilities, electric utilities, and other critical infrastructure sites using these cameras are at risk if the cameras are accessible from untrusted networks.
How it could be exploited
An attacker on the network (or Internet, if the camera is exposed) can connect directly to the camera's management interface on default ports without providing credentials. The attacker can then inject commands or SQL statements to execute arbitrary code on the camera device.
Prerequisites
  • Network access to the camera's management port (typically 80, 443, or 8080)
  • Camera must be reachable from attacker's network location
  • No authentication bypass required
remotely exploitableno authentication requiredlow complexityhigh EPSS score (11.4%)no patch available
Exploitability
High exploit probability (EPSS 11.4%)
Affected products (2)
2 EOL
ProductAffected VersionsFix Status
G-Cam/EFD-2250 (part n° 5.02024) firmware:1.12.0.4No fix (EOL)
Topline TopFD-2125 (part n° 5.02820) firmware:3.15.1No fix (EOL)
Remediation & Mitigation
0/4
Do now
0/2
WORKAROUNDImmediately restrict network access to the IP cameras using firewall rules. Allow only authorized management workstations and monitoring systems to reach the cameras on their management ports.
HARDENINGEnsure the cameras are not accessible from the Internet. If remote access is needed, use a VPN to the facility network rather than exposing the cameras directly.
Schedule — requires maintenance window
0/2

Patching may require device reboot — plan for process interruption

HARDENINGIsolate the camera network segment from the main business network using a firewall or managed switch. Cameras should not be able to directly reach critical control systems, servers, or workstations.
HARDENINGMonitor for any unauthorized access attempts to the cameras. Review camera logs and network traffic for signs of exploitation.
↑↓ Navigate · Esc Close
API: /api/v1/advisories/f7b3574d-0ef6-4cf8-8a48-d050f18a5002
Geutebruck IP Cameras | CVSS 9.8 - OTPulse