Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46959: n/a

0
Medium
VulnerabilityCVE-2024-46959cvecve-2024-46959
Published: Wed Sep 18 2024 (09/18/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

runofast Indoor Security Camera for Baby Monitor has a default password of password for the root account. This allows access to the /stream1 URI via the rtsp:// protocol to receive the video and audio stream.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 07:31:27 UTC

Technical Analysis

CVE-2024-46959 identifies a security vulnerability in the runofast Indoor Security Camera for Baby Monitor, where the root account is configured with a default password 'password'. This weak credential allows any remote attacker to connect to the device's RTSP service without authentication and access the /stream1 URI, thereby receiving the live video and audio stream. The vulnerability is classified under CWE-259 (Use of Hard-coded Password) and has a CVSS v3.1 base score of 6.5, indicating medium severity. The attack vector is adjacent network (AV:A), meaning the attacker must be on the same local network or have network access to the device. No privileges or user interaction are required, and the scope is unchanged. The impact is high on confidentiality as sensitive video and audio data can be intercepted, but integrity and availability remain unaffected. No patches or firmware updates are currently available, and no exploits have been reported in the wild. The vulnerability highlights poor security hygiene in IoT device manufacturing, particularly the use of default credentials that are widely known and easily exploitable.

Potential Impact

The primary impact of this vulnerability is the compromise of confidentiality for users of the runofast Indoor Security Camera for Baby Monitor. Attackers can remotely access live video and audio streams, potentially exposing sensitive personal or family information. This can lead to privacy violations, stalking, or targeted attacks against individuals, especially given the sensitive context of baby monitoring. Although the vulnerability does not allow modification of the stream or denial of service, the exposure of private footage can have severe reputational and emotional consequences. Organizations deploying these devices in homes, daycare centers, or healthcare facilities risk unauthorized surveillance. The lack of patches or mitigations from the vendor increases the risk of exploitation if attackers gain network access. The medium CVSS score reflects the balance between the ease of exploitation and the limited scope of impact to confidentiality only.

Mitigation Recommendations

To mitigate this vulnerability, users and organizations should immediately change the default root password to a strong, unique password to prevent unauthorized access. Network segmentation is critical: isolate IoT devices like baby monitors on separate VLANs or subnets with strict firewall rules to limit access to trusted devices only. Disable RTSP streaming if not required or restrict RTSP access via network controls. Monitor network traffic for unusual RTSP connections or unauthorized access attempts. Regularly audit IoT devices for default credentials and insecure configurations. Vendors should be pressured to release firmware updates that enforce unique credentials per device and disable default passwords. Additionally, consider replacing vulnerable devices with models that follow secure development practices and support regular security updates. Employing network intrusion detection systems (NIDS) capable of identifying RTSP anomalies can provide early warning of exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-16T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d06b7ef31ef0b56d4ee

Added to database: 2/25/2026, 9:43:34 PM

Last enriched: 2/28/2026, 7:31:27 AM

Last updated: 4/12/2026, 9:15:54 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses