Ava-272: vcam credentials logged when RTSP request fails

Release Date

22nd July 2020.


When an RTSP request made to vcam fails, the request, including the authorization header, is logged. This means vcam credentials will be stored in the logs.

Affected Products

  • vcam: All Beta Upgrade Channel versions before 1.3.0.
  • vcam: All Stable Upgrade Channel versions before 1.3.1.

Unaffected Products

  • vcore: All versions.
  • vcloud: All versions.


This issue has been fixed in vcam version 1.3.0 on the Beta Upgrade Channel, and version 1.3.1 on the Stable Upgrade Channel.

We recommend that all vcam installations running an affected version upgrade to the latest release as soon as possible. See How to: Set the Vaion vcam System settings locally or How to: Upgrade your Vaion vcam devices from vcore.

Vulnerability Information

For this vulnerability to be exploitable, an attacker must acquire the logs. Logs are obtainable both through vcam, and vcore if vcam is added to vcore, but require valid credentials for vcam and vcore respectively.


This vulnerability can be mitigated by changing the passwords for vcams.

The applied patch will sanitise existing logs to censor the described credentials information, if any, so no action is required by the user with regards to the logs.


Issue found internally by Ava Security.

Disclosure Timeline

  • 08/06/2020 Issue found internally by Ava Security
  • 08/06/2020 Fix identified
  • 02/07/2020 Patched vcam 1.3.0 (Beta Upgrade Channel) released
  • 22/07/2020 Patched vcam 1.3.1 (Stable Upgrade Channel) released
  • 22/07/2020 Advisory published internally
  • 22/07/2020 Vulnerability publicly disclosed