Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-6248: CWE-287: Improper Authentication in Wyze Cam v3

0
High
VulnerabilityCVE-2024-6248cvecve-2024-6248cwe-287
Published: Fri Nov 22 2024 (11/22/2024, 20:05:42 UTC)
Source: CVE Database V5
Vendor/Project: Wyze
Product: Cam v3

Description

Wyze Cam v3 Cloud Infrastructure Improper Authentication Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Wyze Cam v3 IP cameras. Authentication is not required to exploit this vulnerability. The specific flaw exists within the run_action_batch endpoint of the cloud infrastructure. The issue results from the use of the device's MAC address as a sole credential for authentication. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-22393.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 03:05:23 UTC

Technical Analysis

CVE-2024-6248 is an improper authentication vulnerability (CWE-287) affecting Wyze Cam v3 IP cameras, specifically version 4.36.11.7071. The vulnerability exists in the cloud infrastructure's run_action_batch endpoint, which improperly uses the device's MAC address as the sole authentication mechanism. Since MAC addresses are easily discoverable or spoofable within a network, an attacker positioned on the same or adjacent network segment can bypass authentication controls. This flaw enables remote code execution (RCE) with root privileges on the affected device, allowing attackers to fully compromise the camera. The vulnerability does not require any user interaction or prior authentication, significantly lowering the barrier to exploitation. The CVSS v3.0 score of 7.5 reflects high confidentiality, integrity, and availability impacts, with attack vector classified as adjacent network and high attack complexity. The issue was identified and assigned by the Zero Day Initiative (ZDI) as ZDI-CAN-22393. No public patches or exploits are currently available, but the vulnerability's nature suggests a critical risk to IoT device security and privacy. The flaw could be chained with other vulnerabilities to escalate impact further.

Potential Impact

The vulnerability allows attackers to execute arbitrary code remotely with root privileges on Wyze Cam v3 devices, leading to full device compromise. This can result in unauthorized surveillance, data exfiltration, manipulation or deletion of recorded footage, and potential pivoting into broader network environments. The compromise of these cameras undermines user privacy and can facilitate espionage or harassment. For organizations, especially those deploying Wyze Cam v3 devices in sensitive environments, this vulnerability threatens operational security and could lead to regulatory compliance violations. The lack of authentication requirement and ease of exploitation increase the likelihood of attacks, potentially affecting millions of devices globally. Disruption of camera availability or integrity could impair security monitoring and incident response capabilities. The vulnerability also raises concerns about the security posture of IoT devices relying on weak or improper authentication mechanisms.

Mitigation Recommendations

Organizations and users should immediately verify their Wyze Cam v3 firmware version and avoid using affected versions (4.36.11.7071). Since no official patch is currently available, users should restrict network access to these devices by isolating them on segmented VLANs or dedicated IoT networks to limit attacker proximity. Employ network-level controls such as firewall rules to block unauthorized access to the cloud infrastructure endpoints, especially the run_action_batch endpoint. Monitor network traffic for suspicious activity related to MAC address spoofing or unusual commands sent to cameras. Disable remote access features if not required and use strong, multi-factor authentication where possible for cloud accounts managing these devices. Regularly check for vendor updates or security advisories and apply patches promptly once released. Consider replacing affected devices with models that implement robust authentication mechanisms. Conduct security awareness training for users to recognize potential IoT device compromise indicators.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2024-06-21T14:52:30.170Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6bfeb7ef31ef0b55d67c

Added to database: 2/25/2026, 9:39:10 PM

Last enriched: 2/26/2026, 3:05:23 AM

Last updated: 4/12/2026, 2:03:50 PM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses