Foscam C1 IP Camera FTP Hard Coded Password

High Nessus Plugin ID 101547


The remote host is running an FTP server that is using a hard-coded password.


Nessus was able to log in to the remote FTP server, using the username 'r' with the password 'r', and identify the remote server as a vulnerable Foscam C1 IP Camera. A remote attacker can exploit this to access its FTP service and the mounted Micro-SD card.


Update to firmware version V-2.x.2.43 or later.

See Also

Plugin Details

Severity: High

ID: 101547

File Name: ftp_foscam_c1_ip_camera_hard_coded_creds.nasl

Version: 1.4

Type: remote

Family: FTP

Published: 2017/07/14

Updated: 2018/07/12

Dependencies: 10092

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:foscam:c1_webcam_firmware, cpe:/h:foscam:c1_webcam

Required KB Items: ftp/login

Excluded KB Items: global_settings/supplied_logins_only

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2017/06/19

Vulnerability Publication Date: 2017/06/19

Reference Information

CVE: CVE-2016-8731

BID: 99193