CVE-2024-46959: n/a
runofast Indoor Security Camera for Baby Monitor has a default password of password for the root account. This allows access to the /stream1 URI via the rtsp:// protocol to receive the video and audio stream.
AI Analysis
Technical Summary
CVE-2024-46959 identifies a security vulnerability in the runofast Indoor Security Camera for Baby Monitor, where the root account is configured with a default password 'password'. This weak credential allows any remote attacker to connect to the device's RTSP service without authentication and access the /stream1 URI, thereby receiving the live video and audio stream. The vulnerability is classified under CWE-259 (Use of Hard-coded Password) and has a CVSS v3.1 base score of 6.5, indicating medium severity. The attack vector is adjacent network (AV:A), meaning the attacker must be on the same local network or have network access to the device. No privileges or user interaction are required, and the scope is unchanged. The impact is high on confidentiality as sensitive video and audio data can be intercepted, but integrity and availability remain unaffected. No patches or firmware updates are currently available, and no exploits have been reported in the wild. The vulnerability highlights poor security hygiene in IoT device manufacturing, particularly the use of default credentials that are widely known and easily exploitable.
Potential Impact
The primary impact of this vulnerability is the compromise of confidentiality for users of the runofast Indoor Security Camera for Baby Monitor. Attackers can remotely access live video and audio streams, potentially exposing sensitive personal or family information. This can lead to privacy violations, stalking, or targeted attacks against individuals, especially given the sensitive context of baby monitoring. Although the vulnerability does not allow modification of the stream or denial of service, the exposure of private footage can have severe reputational and emotional consequences. Organizations deploying these devices in homes, daycare centers, or healthcare facilities risk unauthorized surveillance. The lack of patches or mitigations from the vendor increases the risk of exploitation if attackers gain network access. The medium CVSS score reflects the balance between the ease of exploitation and the limited scope of impact to confidentiality only.
Mitigation Recommendations
To mitigate this vulnerability, users and organizations should immediately change the default root password to a strong, unique password to prevent unauthorized access. Network segmentation is critical: isolate IoT devices like baby monitors on separate VLANs or subnets with strict firewall rules to limit access to trusted devices only. Disable RTSP streaming if not required or restrict RTSP access via network controls. Monitor network traffic for unusual RTSP connections or unauthorized access attempts. Regularly audit IoT devices for default credentials and insecure configurations. Vendors should be pressured to release firmware updates that enforce unique credentials per device and disable default passwords. Additionally, consider replacing vulnerable devices with models that follow secure development practices and support regular security updates. Employing network intrusion detection systems (NIDS) capable of identifying RTSP anomalies can provide early warning of exploitation attempts.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, China, India
CVE-2024-46959: n/a
Description
runofast Indoor Security Camera for Baby Monitor has a default password of password for the root account. This allows access to the /stream1 URI via the rtsp:// protocol to receive the video and audio stream.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-46959 identifies a security vulnerability in the runofast Indoor Security Camera for Baby Monitor, where the root account is configured with a default password 'password'. This weak credential allows any remote attacker to connect to the device's RTSP service without authentication and access the /stream1 URI, thereby receiving the live video and audio stream. The vulnerability is classified under CWE-259 (Use of Hard-coded Password) and has a CVSS v3.1 base score of 6.5, indicating medium severity. The attack vector is adjacent network (AV:A), meaning the attacker must be on the same local network or have network access to the device. No privileges or user interaction are required, and the scope is unchanged. The impact is high on confidentiality as sensitive video and audio data can be intercepted, but integrity and availability remain unaffected. No patches or firmware updates are currently available, and no exploits have been reported in the wild. The vulnerability highlights poor security hygiene in IoT device manufacturing, particularly the use of default credentials that are widely known and easily exploitable.
Potential Impact
The primary impact of this vulnerability is the compromise of confidentiality for users of the runofast Indoor Security Camera for Baby Monitor. Attackers can remotely access live video and audio streams, potentially exposing sensitive personal or family information. This can lead to privacy violations, stalking, or targeted attacks against individuals, especially given the sensitive context of baby monitoring. Although the vulnerability does not allow modification of the stream or denial of service, the exposure of private footage can have severe reputational and emotional consequences. Organizations deploying these devices in homes, daycare centers, or healthcare facilities risk unauthorized surveillance. The lack of patches or mitigations from the vendor increases the risk of exploitation if attackers gain network access. The medium CVSS score reflects the balance between the ease of exploitation and the limited scope of impact to confidentiality only.
Mitigation Recommendations
To mitigate this vulnerability, users and organizations should immediately change the default root password to a strong, unique password to prevent unauthorized access. Network segmentation is critical: isolate IoT devices like baby monitors on separate VLANs or subnets with strict firewall rules to limit access to trusted devices only. Disable RTSP streaming if not required or restrict RTSP access via network controls. Monitor network traffic for unusual RTSP connections or unauthorized access attempts. Regularly audit IoT devices for default credentials and insecure configurations. Vendors should be pressured to release firmware updates that enforce unique credentials per device and disable default passwords. Additionally, consider replacing vulnerable devices with models that follow secure development practices and support regular security updates. Employing network intrusion detection systems (NIDS) capable of identifying RTSP anomalies can provide early warning of exploitation attempts.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-09-16T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d06b7ef31ef0b56d4ee
Added to database: 2/25/2026, 9:43:34 PM
Last enriched: 2/28/2026, 7:31:27 AM
Last updated: 4/12/2026, 9:15:54 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.