Vulnerability Details : CVE-2020-29001
Potential exploit
An issue was discovered on Geeni GNC-CW028 Camera 2.7.2, Geeni GNC-CW025 Doorbell 2.9.5, Merkury MI-CW024 Doorbell 2.9.6, and Merkury MI-CW017 Camera 2.9.6 devices. A vulnerability exists in the RESTful Services API that allows a remote attacker to take full control of the camera with a high-privileged account. The vulnerability exists because a static username and password are compiled into the ppsapp RESTful application.
Products affected by CVE-2020-29001
- cpe:2.3:o:merkuryinnovations:geeni_gnc-cw028_firmware:2.7.2:*:*:*:*:*:*:*
- cpe:2.3:o:merkuryinnovations:geeni_gnc-cw025_firmware:2.9.5:*:*:*:*:*:*:*
- cpe:2.3:o:merkuryinnovations:merkury_mi-cw024_firmware:2.9.6:*:*:*:*:*:*:*
- cpe:2.3:o:merkuryinnovations:merkury_mi-cw017_firmware:2.9.6:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-29001
0.51%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 64 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-29001
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST | |
7.2
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
1.2
|
5.9
|
NIST |
CWE ids for CVE-2020-29001
-
The product stores sensitive information in cleartext within a resource that might be accessible to another control sphere.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-29001
-
https://support.mygeeni.com/hc/en-us
My GeeniVendor Advisory
-
https://gist.github.com/tj-oconnor/371d34342c0cc2be015cc89d6dc2bc66
CVE-2020-29001 ยท GitHubExploit;Third Party Advisory
Jump to