CVE-2021-4468

N/A Unknown

📋 TL;DR

PLANEX CS-QP50F-ING2 smart cameras expose an unauthenticated HTTP configuration backup interface. Remote attackers can download backup files containing sensitive credentials, enabling administrative access to the camera and compromising monitored environments. All users of affected cameras are vulnerable.

💻 Affected Systems

Products:
  • PLANEX CS-QP50F-ING2 Smart Camera
Versions: All firmware versions (no specific version range documented)
Operating Systems: Embedded Linux-based firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration. No special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains full administrative control of camera, accesses live video feeds, modifies settings, uses camera as pivot point into network, and potentially accesses other connected devices.

🟠

Likely Case

Attacker obtains camera credentials, accesses video feeds, disables security features, and uses camera for surveillance or as part of botnet.

🟢

If Mitigated

Limited to network reconnaissance if camera is isolated and credentials are rotated, but device remains vulnerable to takeover.

🌐 Internet-Facing: HIGH - Directly exploitable over internet without authentication, exposing cameras to widespread scanning and automated attacks.
🏢 Internal Only: MEDIUM - Requires network access but still exploitable by internal threats or compromised devices.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP GET request to backup endpoint. Exploit code available in public repositories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Contact PLANEX support for firmware updates or replacement options.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate cameras on separate VLAN with strict firewall rules blocking all inbound HTTP access

HTTP Access Restriction

linux

Configure firewall to block HTTP access to camera backup endpoints (typically port 80)

iptables -A INPUT -p tcp --dport 80 -j DROP

🧯 If You Can't Patch

  • Remove cameras from internet-facing networks immediately
  • Change all camera credentials and monitor for unauthorized access

🔍 How to Verify

Check if Vulnerable:

Attempt HTTP GET request to camera IP at /backup.cgi or similar backup endpoints. If configuration file downloads without authentication, device is vulnerable.

Check Version:

Check camera web interface or use nmap scanning: nmap -sV -p 80 [camera_ip]

Verify Fix Applied:

Test same endpoint after implementing workarounds - should return authentication error or connection refused.

📡 Detection & Monitoring

Log Indicators:

  • HTTP GET requests to /backup.cgi or similar backup endpoints
  • Unauthenticated access to configuration endpoints
  • Large file downloads from camera HTTP service

Network Indicators:

  • HTTP traffic to camera port 80 from unauthorized sources
  • Pattern of backup file downloads
  • Unusual outbound traffic from camera after compromise

SIEM Query:

source="camera_logs" AND (uri="/backup.cgi" OR uri CONTAINS "backup") AND status=200

🔗 References

📤 Share & Export