Maik Morgenstern 2 years ago. While the attackers are required to know the URL, this can be found out. Already in February , the use of this stream encryption was forbidden in the encryption protocol TLS RFC for security reasons. All in all, this means we are unable to give a high rating to the product. In this, the storage location is not apparent to users of the app, as there is no corresponding message. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content.
|Date Added:||8 October 2004|
|File Size:||16.72 Mb|
|Operating Systems:||Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X|
|Price:||Free* [*Free Regsitration Required]|
If you don’t select any criteria “all” CVE entries will be returned Vulnerabilities with exploits.
The following illustration shows the intercepted login data in mitmproxy. This page lists vulnerability statistics for all versions of Siemens Gigaset Wlan Camera. Moreover, we examined the connections between the camera and the server more carefully. Because there are not many of them and they make the page look bad; and they may not be actually published in those years.
An additional connection via real-time streaming protocol RTSP is at least partially unencrypted. We see that the connection is protected with TLS 1. You can view versions of this product or security vulnerabilities related to Siemens Gigaset Wlan Camera. The Android app saves downloaded videos unencrypted in freely accessible locations on the smartphone.
Siemens Gigaset Wlan Camera version : Security vulnerabilities
The app saves downloaded videos unencrypted on the SD card of the smartphone. There are NO warranties, implied or otherwise, with regard to this information or its use. CVE or or Already in Februarythe use of this stream encryption was forbidden in the encryption protocol TLS RFC for security reasons. This is followed by binary data; based on the volume and the time sequence, it contains the actual stream or transmission of video and sound.
No authentication is necessary for viewing and downloading the recordings. In this, the storage location is not apparent to users of the app, as there is no corresponding message. While the attackers are required to know the URL, this can be found out.
Testing Gigaset Elements Camera
January 11, Eric Clausing. But there was another category in which the security camera failed to make a good impression in the quick test: If an attempt is made to intercept the connections as part of a man-in-the-middle attack, e.
Log wllan or sign up for an account to create a custom feed or widget.
Thanks to night vision mode, it even works at low light intensity. Internal IP, parameters for the video transmission resolution and codec as well as an authorization token are transmitted, among other things — potentially useful information for an attacker.
How does it work? While the connection between the app and the server is still sufficiently encrypted, the connection between the camera and the server is another story entirely: Outdated encryption In order to transmit the video stream, the camera and app establish encrypted connections to the servers of the manufacturer Gigaset.
Character string 2, by contrast, appears to be assigned at random, and the specification of date and time down to the second would probably present difficulties for attackers without inside view. That is why the camera was also not downgraded in this test category.
Although the data transmission of the deployed Android app is famera in good shape, there are issues concerning the self-protection of the app: The camera from Gigaset records its environment in a picture quality of p with a frame rate of up to 30 FPS.
The fact that this camfra and unsecure encryption is still used to transmit data of the Gigaset camera does not speak for the security of the product.
All in all, this means we are unable to give a high rating to the product. Maik Morgenstern 2 years ago. In our test, the available recordings were determined via api. An additional, at least theoretical vulnerability is found in the connection secured via SSL, over which the camera streams video data: Selected vulnerability types are OR’ed.