CVE-2022-28743
📋 TL;DR
This CVE describes a Time-of-check Time-of-use (TOCTOU) race condition vulnerability in Foscam R2C IP cameras that allows authenticated attackers with administrator permissions to execute arbitrary code via malicious firmware patches. Attackers can gain root access to the camera's Linux system, enabling them to modify device behavior, install backdoors, or access live camera feeds. Only Foscam R2C IP cameras running vulnerable firmware versions are affected.
💻 Affected Systems
- Foscam R2C IP Camera
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full root compromise of the IP camera allowing attackers to modify firmware, install persistent backdoors, access live camera streams, pivot to internal networks, and maintain undetected access.
Likely Case
Attackers with administrator credentials gain root access to the camera, enabling them to view live feeds, modify camera settings, and potentially use the device as a foothold for further network attacks.
If Mitigated
With proper network segmentation and access controls, impact is limited to the camera device itself without network propagation.
🎯 Exploit Status
Requires administrator access and ability to upload firmware. TOCTOU race conditions require precise timing but are well-understood attack vectors.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: System FW > 1.13.1.6 and Application FW > 2.91.2.66
Vendor Advisory: https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/keeping-a-critical-eye-on-iot-devices.html
Restart Required: Yes
Instructions:
1. Log into Foscam camera web interface. 2. Navigate to System > Upgrade. 3. Download latest firmware from Foscam website. 4. Upload and apply firmware update. 5. Camera will reboot automatically.
🔧 Temporary Workarounds
Network Segmentation
allIsolate IP cameras on separate VLAN with strict firewall rules
Access Control
allRestrict administrative access to trusted IP addresses only
🧯 If You Can't Patch
- Remove cameras from internet-facing networks immediately
- Change all administrator passwords and implement strong authentication
🔍 How to Verify
Check if Vulnerable:
Check firmware version in camera web interface under System > Information
Check Version:
Not applicable - use web interface
Verify Fix Applied:
Verify firmware version shows System FW > 1.13.1.6 and Application FW > 2.91.2.66
📡 Detection & Monitoring
Log Indicators:
- Unusual firmware upload attempts
- Multiple failed authentication attempts followed by successful login
- Unexpected system reboots
Network Indicators:
- Unusual outbound connections from camera
- Firmware download from non-Foscam sources
- SSH/Telnet connections to camera
SIEM Query:
source="camera_logs" AND (event="firmware_upload" OR event="admin_login")