CVE-2020-37146

ACE Security · WiP-90113 HD Camera

ACE Security WiP-90113 HD Camera contains a configuration disclosure vulnerability. Unauthenticated attackers can remotely retrieve sensitive configuration files from the device.

Executive summary

The ACE Security WiP-90113 HD Camera is vulnerable to an unauthenticated configuration disclosure flaw that allows attackers to steal sensitive device information.

Vulnerability

This vulnerability is a configuration disclosure flaw that allows an unauthenticated, remote attacker to retrieve sensitive configuration files. The lack of proper access controls on the device's web interface enables the extraction of critical system settings.

Business impact

The exposure of configuration files represents a critical privacy and security breach. Attackers can use the extracted data to gain deeper access to the camera, potentially viewing live feeds or using the device as a pivot point into the local network. With a CVSS score of 7.5, this vulnerability threatens the physical security and data privacy of the environment where the camera is deployed.

Remediation

Immediate Action: Apply the latest firmware update from ACE Security to address the insecure configuration endpoint.

Proactive Monitoring: Inspect network traffic for unauthorized HTTP requests targeting configuration paths on IoT camera devices.

Compensating Controls: Place IP cameras on a segmented VLAN with no direct access to the internet and implement strict firewall rules to block unauthorized inbound traffic.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The ability for unauthenticated users to pull sensitive configuration data is a major security failure. Administrators must ensure that all ACE Security WiP-90113 cameras are updated immediately and isolated from public-facing networks to mitigate the risk of unauthorized surveillance or network intrusion.