CVE-2019-11014

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to spoof VStarCam camera servers on local networks, intercept client connections, and steal camera login credentials. It affects users of the Eye4 application on Android, iOS, and Windows that communicate with vulnerable VStarCam devices. Attackers can perform man-in-the-middle attacks to capture credentials and potentially take control of cameras.

💻 Affected Systems

Products:
  • VStarCam cameras using vstc.vscam.client library
  • Eye4 application for Android
  • Eye4 application for iOS
  • Eye4 application for Windows
Versions: All versions prior to patched versions (specific version unknown)
Operating Systems: Android, iOS, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the camera discovery protocol implementation; affects devices using the vulnerable library components.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full control of security cameras, access live feeds, manipulate recordings, disable security monitoring, and potentially pivot to other network devices using stolen credentials.

🟠

Likely Case

Attackers intercept camera credentials, access live video feeds, and potentially disable legitimate camera connections, compromising privacy and security monitoring.

🟢

If Mitigated

With network segmentation and proper authentication, impact is limited to isolated camera networks with no access to sensitive systems.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires local network access; attack tools can be built using published technical details from security researchers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown specific version - check vendor updates

Vendor Advisory: No official vendor advisory URL found in references

Restart Required: Yes

Instructions:

1. Update Eye4 application to latest version from official app stores. 2. Update camera firmware if available from manufacturer. 3. Restart both application and camera after updates.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate camera network from other devices to limit attack surface

Disable Broadcast Discovery

all

Configure cameras with static IPs and disable automatic discovery features

🧯 If You Can't Patch

  • Segment camera network using VLANs or separate physical network
  • Implement network monitoring for unusual broadcast traffic or spoofing attempts

🔍 How to Verify

Check if Vulnerable:

Check if using VStarCam cameras with Eye4 application; test if camera responds to broadcast discovery requests with unencrypted credentials.

Check Version:

Check app version in application settings; camera firmware typically checked via manufacturer's management interface.

Verify Fix Applied:

Verify application and firmware versions are updated; test that camera discovery no longer broadcasts sensitive information in clear text.

📡 Detection & Monitoring

Log Indicators:

  • Multiple camera discovery responses from same IP
  • Failed authentication attempts from unexpected IPs
  • Camera connection drops followed by new connections

Network Indicators:

  • Excessive UDP broadcast traffic on port 8600 (typical discovery port)
  • Multiple devices responding to single discovery request
  • Unencrypted credential transmission in network captures

SIEM Query:

source_ip=* AND (udp.port=8600 OR protocol="VStarCam") AND event_count>10 WITHIN 5min

🔗 References

📤 Share & Export