CVE-2018-10662

9.8 CRITICAL

📋 TL;DR

CVE-2018-10662 is an exposed insecure interface vulnerability in multiple Axis IP camera models that allows unauthenticated attackers to access sensitive configuration data and potentially execute arbitrary code. This affects numerous Axis camera models running vulnerable firmware versions. Organizations using affected cameras for surveillance or security monitoring are at risk.

💻 Affected Systems

Products:
  • Multiple Axis IP Camera models (see Axis advisory for complete list)
Versions: Firmware versions prior to 5.80.1
Operating Systems: Embedded Linux-based firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects cameras with VAPIX API enabled (default configuration). Complete affected product list available in Axis advisory ACV-128401.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of camera system leading to unauthorized video access, camera manipulation, lateral movement to internal networks, and persistent backdoor installation.

🟠

Likely Case

Unauthorized access to camera feeds, configuration tampering, and potential denial of service affecting surveillance operations.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, though exposed interfaces remain vulnerable to targeted attacks.

🌐 Internet-Facing: HIGH - Directly exposed cameras can be easily discovered and exploited by automated scanning tools.
🏢 Internal Only: MEDIUM - Internal attackers or malware could exploit this to pivot through networks and compromise surveillance systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code available on Exploit-DB (45100). Attack requires network access to camera interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware 5.80.1 and later

Vendor Advisory: https://www.axis.com/files/faq/Advisory_ACV-128401.pdf

Restart Required: Yes

Instructions:

1. Download latest firmware from Axis support portal. 2. Backup camera configuration. 3. Upload firmware via web interface. 4. Reboot camera. 5. Restore configuration if needed.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate cameras on separate VLAN with strict firewall rules limiting access to management interfaces.

Disable Unnecessary Services

all

Disable VAPIX API if not required for functionality.

🧯 If You Can't Patch

  • Implement strict network access controls allowing only authorized management systems to communicate with cameras
  • Deploy network monitoring and intrusion detection specifically for camera traffic patterns

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface (Setup > System Options > Support > System Overview) and compare to version 5.80.1

Check Version:

curl -s http://[camera-ip]/axis-cgi/admin/param.cgi?action=list&group=Properties.Firmware.Version

Verify Fix Applied:

Confirm firmware version is 5.80.1 or later and test VAPIX API endpoints for restricted access

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to VAPIX API endpoints
  • Configuration changes without authentication

Network Indicators:

  • Unusual traffic patterns to camera management ports (80/443)
  • Requests to sensitive VAPIX endpoints from unauthorized sources

SIEM Query:

source_ip=* AND (dest_port=80 OR dest_port=443) AND (uri_path="/axis-cgi/*" OR user_agent="*curl*" OR user_agent="*wget*") AND NOT src_ip IN [authorized_management_ips]

🔗 References

📤 Share & Export