Vulnerabilites related to dahua - dh-sd6xxxxx
cve-2019-3948
Vulnerability from cvelistv5
Published
2019-07-29 21:47
Modified
2024-08-04 19:26
Severity ?
Summary
The Amcrest IP2M-841B V2.520.AC00.18.R, Dahua IPC-XXBXX V2.622.0000000.9.R, Dahua IPC HX5X3X and HX4X3X V2.800.0000008.0.R, Dahua DH-IPC HX883X and DH-IPC-HX863X V2.622.0000000.7.R, Dahua DH-SD4XXXXX V2.623.0000000.7.R, Dahua DH-SD5XXXXX V2.623.0000000.1.R, Dahua DH-SD6XXXXX V2.640.0000000.2.R and V2.623.0000000.1.R, Dahua NVR5XX-4KS2 V3.216.0000006.0.R, Dahua NVR4XXX-4KS2 V3.216.0000006.0.R, and NVR2XXX-4KS2 do not require authentication to access the HTTP endpoint /videotalk. An unauthenticated, remote person can connect to this endpoint and potentionally listen to the audio of the capturing device.
Impacted products
Vendor Product Version
n/a Dahua IPC-XXBXX Version: V2.622.0000000.9.R
   n/a Dahua IPC HX5X3X and HX4X3X Version: V2.800.0000008.0.R
   n/a Dahua DH-IPC HX883X and DH-IPC-HX863X Version: V2.622.0000000.7.R
   n/a Dahua DH-SD4XXXXX Version: V2.623.0000000.7.R
   n/a Dahua DH-SD5XXXXX Version: V2.623.0000000.1.R
   n/a Dahua DH-SD6XXXXX Version: V2.640.0000000.2.R and V2.623.0000000.1.R
   n/a Dahua NVR5XX-4KS2 Version: V3.216.0000006.0.R
   n/a Dahua NVR4XXX-4KS2 Version: V3.216.0000006.0.R and NVR2XXX-4KS2
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T19:26:27.619Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.tenable.com/security/research/tra-2019-36"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/153813/Amcrest-Cameras-2.520.AC00.18.R-Unauthenticated-Audio-Streaming.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://us.dahuasecurity.com/wp-content/uploads/2019/08/Cybersecurity_2019-08-02.pdf"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.dahuasecurity.com/support/cybersecurity/details/627?us"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Dahua IPC-XXBXX",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "V2.622.0000000.9.R"
            }
          ]
        },
        {
          "product": "Dahua IPC HX5X3X and HX4X3X",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "V2.800.0000008.0.R"
            }
          ]
        },
        {
          "product": "Dahua DH-IPC HX883X and DH-IPC-HX863X",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "V2.622.0000000.7.R"
            }
          ]
        },
        {
          "product": "Dahua DH-SD4XXXXX",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "V2.623.0000000.7.R"
            }
          ]
        },
        {
          "product": "Dahua DH-SD5XXXXX",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "V2.623.0000000.1.R"
            }
          ]
        },
        {
          "product": "Dahua DH-SD6XXXXX",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "V2.640.0000000.2.R and V2.623.0000000.1.R"
            }
          ]
        },
        {
          "product": "Dahua NVR5XX-4KS2",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "V3.216.0000006.0.R"
            }
          ]
        },
        {
          "product": "Dahua NVR4XXX-4KS2",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "V3.216.0000006.0.R and NVR2XXX-4KS2"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Amcrest IP2M-841B V2.520.AC00.18.R, Dahua IPC-XXBXX V2.622.0000000.9.R, Dahua IPC HX5X3X and HX4X3X V2.800.0000008.0.R, Dahua DH-IPC HX883X and DH-IPC-HX863X V2.622.0000000.7.R, Dahua DH-SD4XXXXX V2.623.0000000.7.R, Dahua DH-SD5XXXXX V2.623.0000000.1.R, Dahua DH-SD6XXXXX V2.640.0000000.2.R and V2.623.0000000.1.R, Dahua NVR5XX-4KS2 V3.216.0000006.0.R, Dahua NVR4XXX-4KS2 V3.216.0000006.0.R, and NVR2XXX-4KS2 do not require authentication to access the HTTP endpoint /videotalk. An unauthenticated, remote person can connect to this endpoint and potentionally listen to the audio of the capturing device."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "CWE 285 - Improper Access Control (Authorization)",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-08-14T14:22:08",
        "orgId": "5ac1ecc2-367a-4d16-a0b2-35d495ddd0be",
        "shortName": "tenable"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.tenable.com/security/research/tra-2019-36"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/153813/Amcrest-Cameras-2.520.AC00.18.R-Unauthenticated-Audio-Streaming.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://us.dahuasecurity.com/wp-content/uploads/2019/08/Cybersecurity_2019-08-02.pdf"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.dahuasecurity.com/support/cybersecurity/details/627?us"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vulnreport@tenable.com",
          "ID": "CVE-2019-3948",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Dahua IPC-XXBXX",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V2.622.0000000.9.R"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Dahua IPC HX5X3X and HX4X3X",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V2.800.0000008.0.R"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Dahua DH-IPC HX883X and DH-IPC-HX863X",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V2.622.0000000.7.R"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Dahua DH-SD4XXXXX",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V2.623.0000000.7.R"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Dahua DH-SD5XXXXX",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V2.623.0000000.1.R"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Dahua DH-SD6XXXXX",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V2.640.0000000.2.R and V2.623.0000000.1.R"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Dahua NVR5XX-4KS2",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V3.216.0000006.0.R"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Dahua NVR4XXX-4KS2",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "V3.216.0000006.0.R and NVR2XXX-4KS2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Amcrest IP2M-841B V2.520.AC00.18.R, Dahua IPC-XXBXX V2.622.0000000.9.R, Dahua IPC HX5X3X and HX4X3X V2.800.0000008.0.R, Dahua DH-IPC HX883X and DH-IPC-HX863X V2.622.0000000.7.R, Dahua DH-SD4XXXXX V2.623.0000000.7.R, Dahua DH-SD5XXXXX V2.623.0000000.1.R, Dahua DH-SD6XXXXX V2.640.0000000.2.R and V2.623.0000000.1.R, Dahua NVR5XX-4KS2 V3.216.0000006.0.R, Dahua NVR4XXX-4KS2 V3.216.0000006.0.R, and NVR2XXX-4KS2 do not require authentication to access the HTTP endpoint /videotalk. An unauthenticated, remote person can connect to this endpoint and potentionally listen to the audio of the capturing device."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE 285 - Improper Access Control (Authorization)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.tenable.com/security/research/tra-2019-36",
              "refsource": "MISC",
              "url": "https://www.tenable.com/security/research/tra-2019-36"
            },
            {
              "name": "http://packetstormsecurity.com/files/153813/Amcrest-Cameras-2.520.AC00.18.R-Unauthenticated-Audio-Streaming.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/153813/Amcrest-Cameras-2.520.AC00.18.R-Unauthenticated-Audio-Streaming.html"
            },
            {
              "name": "https://us.dahuasecurity.com/wp-content/uploads/2019/08/Cybersecurity_2019-08-02.pdf",
              "refsource": "MISC",
              "url": "https://us.dahuasecurity.com/wp-content/uploads/2019/08/Cybersecurity_2019-08-02.pdf"
            },
            {
              "name": "https://www.dahuasecurity.com/support/cybersecurity/details/627?us",
              "refsource": "MISC",
              "url": "https://www.dahuasecurity.com/support/cybersecurity/details/627?us"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "5ac1ecc2-367a-4d16-a0b2-35d495ddd0be",
    "assignerShortName": "tenable",
    "cveId": "CVE-2019-3948",
    "datePublished": "2019-07-29T21:47:27",
    "dateReserved": "2019-01-03T00:00:00",
    "dateUpdated": "2024-08-04T19:26:27.619Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

var-201907-0246
Vulnerability from variot

The Amcrest IP2M-841B V2.520.AC00.18.R, Dahua IPC-XXBXX V2.622.0000000.9.R, Dahua IPC HX5X3X and HX4X3X V2.800.0000008.0.R, Dahua DH-IPC HX883X and DH-IPC-HX863X V2.622.0000000.7.R, Dahua DH-SD4XXXXX V2.623.0000000.7.R, Dahua DH-SD5XXXXX V2.623.0000000.1.R, Dahua DH-SD6XXXXX V2.640.0000000.2.R and V2.623.0000000.1.R, Dahua NVR5XX-4KS2 V3.216.0000006.0.R, Dahua NVR4XXX-4KS2 V3.216.0000006.0.R, and NVR2XXX-4KS2 do not require authentication to access the HTTP endpoint /videotalk. An unauthenticated, remote person can connect to this endpoint and potentionally listen to the audio of the capturing device. Amcrest IP2M-841B IP Camera firmware Contains an authentication vulnerability.Information may be obtained. The Amcrest IP2M-841B is an IP camera from Amcrest

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201907-0246",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ip2m-841b",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "amcrest",
        "version": "2.520.ac00.18.r"
      },
      {
        "model": "ipc-xxbxx",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "dahua",
        "version": "2018-05-18"
      },
      {
        "model": "dh-sd6xxxxx",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "dahua",
        "version": "2018-05-18"
      },
      {
        "model": "nvr5xxx-4ks2",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "dahua",
        "version": "2018-05-18"
      },
      {
        "model": "dh-ipc-hx883x",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "dahua",
        "version": "2018-05-18"
      },
      {
        "model": "dh-ipc-hx863x",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "dahua",
        "version": "2018-05-18"
      },
      {
        "model": "dh-sd5xxxxx",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "dahua",
        "version": "2018-05-18"
      },
      {
        "model": "ipc-hx4x3x",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "dahua",
        "version": "2018-05-18"
      },
      {
        "model": "nvr2xxx-4ks2",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "dahua",
        "version": "2018-05-18"
      },
      {
        "model": "ipc-hx5x3x",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "dahua",
        "version": "2018-05-18"
      },
      {
        "model": "nvr4xxx-4ks2",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "dahua",
        "version": "2018-05-18"
      },
      {
        "model": "dh-sd4xxxxx",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "dahua",
        "version": "2018-05-18"
      },
      {
        "model": "dh-ipc-hx863x",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "model": "dh-ipc-hx883x",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "model": "dh-sd4xxxxx",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "model": "dh-sd5xxxxx",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "model": "dh-sd6xxxxx",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "model": "ipc-hx4x3x",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "model": "ipc-hx5x3x",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "model": "ipc-xxbxx",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "model": "nvr2xxx-4ks2",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "model": "ip2m-841b 2.520.ac00.18.r",
        "scope": null,
        "trust": 0.6,
        "vendor": "amcrest",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25804"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007425"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-3948"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:amcrest:ip2m-841b_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:dahuasecurity:dh-ipc-hx863x",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:dahuasecurity:dh-ipc-hx883x",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:dahuasecurity:dh-sd4xxxxx_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:dahuasecurity:dh-sd5xxxxx_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:dahuasecurity:dh-sd6xxxxx_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:dahuasecurity:ipc-hx4x3x",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:dahuasecurity:ipc-hx5x3x",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:dahuasecurity:ipc-xxbxx",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:dahuasecurity:nvr2xxx-4ks2",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007425"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Jacob Baines",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1485"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2019-3948",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2019-3948",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.4,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2019-25804",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-155383",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2019-3948",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-3948",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-3948",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2019-25804",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201907-1485",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-155383",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2019-3948",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25804"
      },
      {
        "db": "VULHUB",
        "id": "VHN-155383"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-3948"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007425"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1485"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-3948"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The Amcrest IP2M-841B V2.520.AC00.18.R, Dahua IPC-XXBXX V2.622.0000000.9.R, Dahua IPC HX5X3X and HX4X3X V2.800.0000008.0.R, Dahua DH-IPC HX883X and DH-IPC-HX863X V2.622.0000000.7.R, Dahua DH-SD4XXXXX V2.623.0000000.7.R, Dahua DH-SD5XXXXX V2.623.0000000.1.R, Dahua DH-SD6XXXXX V2.640.0000000.2.R and V2.623.0000000.1.R, Dahua NVR5XX-4KS2 V3.216.0000006.0.R, Dahua NVR4XXX-4KS2 V3.216.0000006.0.R, and NVR2XXX-4KS2 do not require authentication to access the HTTP endpoint /videotalk. An unauthenticated, remote person can connect to this endpoint and potentionally listen to the audio of the capturing device. Amcrest IP2M-841B IP Camera firmware Contains an authentication vulnerability.Information may be obtained. The Amcrest IP2M-841B is an IP camera from Amcrest",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-3948"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007425"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25804"
      },
      {
        "db": "VULHUB",
        "id": "VHN-155383"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-3948"
      }
    ],
    "trust": 2.34
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=47188",
        "trust": 0.1,
        "type": "exploit"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2019-3948"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-3948",
        "trust": 3.2
      },
      {
        "db": "TENABLE",
        "id": "TRA-2019-36",
        "trust": 2.6
      },
      {
        "db": "PACKETSTORM",
        "id": "153813",
        "trust": 1.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007425",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1485",
        "trust": 0.7
      },
      {
        "db": "EXPLOIT-DB",
        "id": "47188",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25804",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-155383",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-3948",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25804"
      },
      {
        "db": "VULHUB",
        "id": "VHN-155383"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-3948"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007425"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1485"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-3948"
      }
    ]
  },
  "id": "VAR-201907-0246",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25804"
      },
      {
        "db": "VULHUB",
        "id": "VHN-155383"
      }
    ],
    "trust": 1.3666667
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25804"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:51:43.811000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "IP2M-841B (Black)",
        "trust": 0.8,
        "url": "https://amcrest.com/amcrest-1080p-wifi-video-security-ip-camera-pt.html"
      },
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.dahuasecurity.com/"
      },
      {
        "title": "AmcrestIP2M-841B authentication bypass vulnerability patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/173073"
      },
      {
        "title": "Amcrest IP2M-841B Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=95601"
      },
      {
        "title": "Goby",
        "trust": 0.1,
        "url": "https://github.com/retr0-13/Goby "
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/20142995/Goby "
      },
      {
        "title": "sec-daily-2019",
        "trust": 0.1,
        "url": "https://github.com/alphaSeclab/sec-daily-2019 "
      },
      {
        "title": "Threatpost",
        "trust": 0.1,
        "url": "https://threatpost.com/trivial-bug-turns-home-security-cameras-into-listening-posts/146835/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25804"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-3948"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007425"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1485"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-306",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-287",
        "trust": 0.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-155383"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007425"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-3948"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.0,
        "url": "http://packetstormsecurity.com/files/153813/amcrest-cameras-2.520.ac00.18.r-unauthenticated-audio-streaming.html"
      },
      {
        "trust": 2.6,
        "url": "https://www.tenable.com/security/research/tra-2019-36"
      },
      {
        "trust": 2.0,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3948"
      },
      {
        "trust": 1.8,
        "url": "https://us.dahuasecurity.com/wp-content/uploads/2019/08/cybersecurity_2019-08-02.pdf"
      },
      {
        "trust": 1.8,
        "url": "https://www.dahuasecurity.com/support/cybersecurity/details/627?us"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-3948"
      },
      {
        "trust": 0.7,
        "url": "https://www.exploit-db.com/exploits/47188"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/306.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://threatpost.com/trivial-bug-turns-home-security-cameras-into-listening-posts/146835/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25804"
      },
      {
        "db": "VULHUB",
        "id": "VHN-155383"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-3948"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007425"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1485"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-3948"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25804"
      },
      {
        "db": "VULHUB",
        "id": "VHN-155383"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-3948"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007425"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1485"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-3948"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-08-05T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-25804"
      },
      {
        "date": "2019-07-29T00:00:00",
        "db": "VULHUB",
        "id": "VHN-155383"
      },
      {
        "date": "2019-07-29T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-3948"
      },
      {
        "date": "2019-08-09T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-007425"
      },
      {
        "date": "2019-07-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201907-1485"
      },
      {
        "date": "2019-07-29T22:15:12.253000",
        "db": "NVD",
        "id": "CVE-2019-3948"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-08-05T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-25804"
      },
      {
        "date": "2020-08-24T00:00:00",
        "db": "VULHUB",
        "id": "VHN-155383"
      },
      {
        "date": "2020-08-24T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-3948"
      },
      {
        "date": "2019-08-09T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-007425"
      },
      {
        "date": "2020-08-25T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201907-1485"
      },
      {
        "date": "2024-11-21T04:42:55.520000",
        "db": "NVD",
        "id": "CVE-2019-3948"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1485"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Amcrest IP2M-841B IP Camera firmware Authentication vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007425"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "access control error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1485"
      }
    ],
    "trust": 0.6
  }
}

var-201711-1047
Vulnerability from variot

Customer of Dahua IP camera or IP PTZ could submit relevant device information to receive a time limited temporary password from Dahua authorized dealer to reset the admin password. The algorithm used in this mechanism is potentially at risk of being compromised and subsequently utilized by attacker. Dahua IP Camera and IP PTZ Contains a cryptographic vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Dahua Technology IP Camera. Authentication is not required to exploit this vulnerability.The specific flaw exists within the disaster recovery password functionality. If the device uses its default settings, the password generation algorithm produces a predictable result. An attacker can leverage this vulnerability to gain control of the device under attack. Dahua IPC-HFW and others are network camera equipment of Dahua Company of China. There are security vulnerabilities in several Dahua products. An attacker could use this vulnerability to reset the administrator password. Dahua IPC-HFW, etc. The following products are affected: Dahua IPC-HFW1XXX Build 2015/07 to 2017/03; IPC-HDW1XXX Build 2015/07 to 2017/03; IPC-HDBW1XXX Build 2015/07 to 2017/03; IPC- HFW2XXX Build 2015/07 to 2017/03; IPC-HDW2XXX Build 2015/07 to 2017/03; IPC-HDBW2XXX Build 2015/07 to 2017/03; IPC-HFW4XXX Build 2015/07 to 2017 /03 version; IPC-HDW4XXX Build 2015/07 to 2017/03 version; IPC-HDBW4XXX Build 2015/07 to 2017/03 version; IPC-HF5XXX Build 2015/07 to 2017/03 version; IPC-HFW5XXX Build 2015/07 to 2017/03; IPC-HDW5XXX Build 2015/07 to 2017/03; IPC-HDBW5XXX Build 2015/07 to 2017/03; IPC-HF8XXX Build 2015/07 to 2017/03 Version; IPC-HFW8XXX Build 2015/07 to 2017/03; IPC-HDBW8XXX Build 2015/07 to 2017/03; IPC-EBW8XXX Build 2015/07 to 2017/03; IPC-PFW8xxx Build 2015/ 07 version to 2017/03 version; IPC-PDBW8xxx Build 2015/07 version to 2017/03 version; IPC-HUM8xxx Build 2015/07 version to 2017/03 version

Show details on source website


{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "ipc-hfw1xxx",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "dahuasecurity",
        "version": null
      },
      {
        "_id": null,
        "model": "ipc-hfw2xxx",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "dahuasecurity",
        "version": null
      },
      {
        "_id": null,
        "model": "ipc-hdw1xxx",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "dahuasecurity",
        "version": null
      },
      {
        "_id": null,
        "model": "ipc-hdw4xxx",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "dahuasecurity",
        "version": null
      },
      {
        "_id": null,
        "model": "ipc-hfw4xxx",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "dahuasecurity",
        "version": null
      },
      {
        "_id": null,
        "model": "ipc-hdbw1xxx",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "dahuasecurity",
        "version": null
      },
      {
        "_id": null,
        "model": "ipc-hdw2xxx",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "dahuasecurity",
        "version": null
      },
      {
        "_id": null,
        "model": "ipc-hf5xxx",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "dahuasecurity",
        "version": null
      },
      {
        "_id": null,
        "model": "ipc-hdbw2xxx",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "dahuasecurity",
        "version": null
      },
      {
        "_id": null,
        "model": "ipc-hdbw4xxx",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "dahuasecurity",
        "version": null
      },
      {
        "_id": null,
        "model": "ipc-hfw5xxx",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dahuasecurity",
        "version": null
      },
      {
        "_id": null,
        "model": "ipc-hdbw8xxx",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dahuasecurity",
        "version": null
      },
      {
        "_id": null,
        "model": "psd8xxxx",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dahuasecurity",
        "version": null
      },
      {
        "_id": null,
        "model": "dh-sd5xxxxx",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dahuasecurity",
        "version": null
      },
      {
        "_id": null,
        "model": "ipc-hdw5xxx",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dahuasecurity",
        "version": null
      },
      {
        "_id": null,
        "model": "dh-sd4xxxxx",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dahuasecurity",
        "version": null
      },
      {
        "_id": null,
        "model": "ipc-pdbw8xxx",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dahuasecurity",
        "version": null
      },
      {
        "_id": null,
        "model": "ipc-hf8xxx",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dahuasecurity",
        "version": null
      },
      {
        "_id": null,
        "model": "ipc-ebw8xxx",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dahuasecurity",
        "version": null
      },
      {
        "_id": null,
        "model": "ipc-pfw8xxx",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dahuasecurity",
        "version": null
      },
      {
        "_id": null,
        "model": "dh-sd2xxxxx",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dahuasecurity",
        "version": null
      },
      {
        "_id": null,
        "model": "ipc-hfw8xxx",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dahuasecurity",
        "version": null
      },
      {
        "_id": null,
        "model": "dh-sd6xxxxx",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dahuasecurity",
        "version": null
      },
      {
        "_id": null,
        "model": "ipc-hdbw5xxx",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dahuasecurity",
        "version": null
      },
      {
        "_id": null,
        "model": "ipc-hum8xxx",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dahuasecurity",
        "version": null
      },
      {
        "_id": null,
        "model": "dh-ipc-hdw1xxx",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "_id": null,
        "model": "dh-ipc-hdw2xxx",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "_id": null,
        "model": "dh-ipc-hdw4xxx",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "_id": null,
        "model": "dh-ipc-hfw1xxx",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "_id": null,
        "model": "dh-sd2xxxxx",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "_id": null,
        "model": "dh-sd4xxxxx",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "_id": null,
        "model": "dh-sd5xxxxx",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "_id": null,
        "model": "dh-sd6xxxxx",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "_id": null,
        "model": "ipc-ebw8xxx",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "_id": null,
        "model": "ipc-hdbw1xxx",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "_id": null,
        "model": "ipc-hdbw2xxx",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "_id": null,
        "model": "ipc-hdbw4xxx",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "_id": null,
        "model": "ipc-hdbw5xxx",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "_id": null,
        "model": "ipc-hdbw8xxx",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "_id": null,
        "model": "ipc-hdw5xxx",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "_id": null,
        "model": "ipc-hf5xxx",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "_id": null,
        "model": "ipc-hf8xxx",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "_id": null,
        "model": "ipc-hfw2xxx",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "_id": null,
        "model": "ipc-hfw4xxx",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "_id": null,
        "model": "ipc-hfw5xxx",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "_id": null,
        "model": "ipc-hfw8xxx",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "_id": null,
        "model": "ipc-hum8xxx",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "_id": null,
        "model": "ipc-pdbw8xxx",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "_id": null,
        "model": "ipc-pfw8xxx",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "_id": null,
        "model": "psd8xxxx",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "_id": null,
        "model": "ip camera",
        "scope": null,
        "trust": 0.7,
        "vendor": "dahua",
        "version": null
      },
      {
        "_id": null,
        "model": "security ipc-hf5xxx",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "dahua",
        "version": "2015/07,\u003c=2017/03"
      },
      {
        "_id": null,
        "model": "security ipc-hfw5xxx",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "dahua",
        "version": "2015/07,\u003c=2017/03"
      },
      {
        "_id": null,
        "model": "security ipc-hdw5xxx",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "dahua",
        "version": "2015/07,\u003c=2017/03"
      },
      {
        "_id": null,
        "model": "security ipc-hdbw5xxx",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "dahua",
        "version": "2015/07,\u003c=2017/03"
      },
      {
        "_id": null,
        "model": "security ipc-hf8xxx",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "dahua",
        "version": "2015/07,\u003c=2017/03"
      },
      {
        "_id": null,
        "model": "security ipc-hfw8xxx",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "dahua",
        "version": "2015/07,\u003c=2017/03"
      },
      {
        "_id": null,
        "model": "security ipc-hdbw8xxx",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "dahua",
        "version": "2015/07,\u003c=2017/03"
      },
      {
        "_id": null,
        "model": "security ipc-ebw8xxx",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "dahua",
        "version": "2015/07,\u003c=2017/03"
      },
      {
        "_id": null,
        "model": "security ipc-pfw8xxx",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "dahua",
        "version": "2015/07,\u003c=2017/03"
      },
      {
        "_id": null,
        "model": "security ipc-pdbw8xxx",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "dahua",
        "version": "2015/07,\u003c=2017/03"
      },
      {
        "_id": null,
        "model": "security ipc-hum8xxx",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "dahua",
        "version": "2015/07,\u003c=2017/03"
      },
      {
        "_id": null,
        "model": "security psd",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "dahua",
        "version": "2015/07,\u003c=2017/03"
      },
      {
        "_id": null,
        "model": "security ipc-hfw1xxx",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "dahua",
        "version": "2015/07,\u003c=2017/03"
      },
      {
        "_id": null,
        "model": "security ipc-hdw1xxx",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "dahua",
        "version": "2015/07,\u003c=2017/03"
      },
      {
        "_id": null,
        "model": "security ipc-hdbw1xxx",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "dahua",
        "version": "2015/07,\u003c=2017/03"
      },
      {
        "_id": null,
        "model": "security ipc-hfw2xxx",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "dahua",
        "version": "2015/07,\u003c=2017/03"
      },
      {
        "_id": null,
        "model": "security ipc-hdw2xxx",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "dahua",
        "version": "2015/07,\u003c=2017/03"
      },
      {
        "_id": null,
        "model": "security ipc-hdbw2xxx",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "dahua",
        "version": "2015/07,\u003c=2017/03"
      },
      {
        "_id": null,
        "model": "security ipc-hfw4xxx",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "dahua",
        "version": "2015/07,\u003c=2017/03"
      },
      {
        "_id": null,
        "model": "security ipc-hdw4xxx",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "dahua",
        "version": "2015/07,\u003c=2017/03"
      },
      {
        "_id": null,
        "model": "security dh-sd6xxxxx",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "dahua",
        "version": "2015/07,\u003c=2017/03"
      },
      {
        "_id": null,
        "model": "security dh-sd5xxxxx",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "dahua",
        "version": "2015/07,\u003c=2017/03"
      },
      {
        "_id": null,
        "model": "security dh-sd4xxxxx",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "dahua",
        "version": "2015/07,\u003c=2017/03"
      },
      {
        "_id": null,
        "model": "security dh-sd2xxxxx",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "dahua",
        "version": "2015/07,\u003c=2017/03"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-130"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-38224"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-011143"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201705-1393"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-9315"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:dahuasecurity:dh-ipc-hdw1xxx_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:dahuasecurity:dh-ipc-hdw2xxx_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:dahuasecurity:dh-ipc-hdw4xxx_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:dahuasecurity:dh-ipc-hfw1xxx_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:dahuasecurity:dh-sd2xxxxx_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:dahuasecurity:dh-sd4xxxxx_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:dahuasecurity:dh-sd5xxxxx_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:dahuasecurity:dh-sd6xxxxx_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:dahuasecurity:ipc-ebw8xxx_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:dahuasecurity:ipc-hdbw1xxx_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:dahuasecurity:ipc-hdbw2xxx_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:dahuasecurity:ipc-hdbw4xxx_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:dahuasecurity:ipc-hdbw5xxx_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:dahuasecurity:ipc-hdbw8xxx_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:dahuasecurity:ipc-hdw5xxx_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:dahuasecurity:ipc-hf5xxx_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:dahuasecurity:ipc-hf8xxx_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:dahuasecurity:ipc-hfw2xxx_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:dahuasecurity:ipc-hfw4xxx_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:dahuasecurity:ipc-hfw5xxx_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:dahuasecurity:ipc-hfw8xxx_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:dahuasecurity:ipc-hum8xxx_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:dahuasecurity:ipc-pdbw8xxx_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:dahuasecurity:ipc-pfw8xxx_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:dahuasecurity:psd8xxxx_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-011143"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "Kenney Lu Trend Micro",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-130"
      }
    ],
    "trust": 0.7
  },
  "cve": "CVE-2017-9315",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2017-9315",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "ZDI",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2017-9315",
            "impactScore": 8.5,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "HIGH",
            "trust": 0.7,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2017-38224",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-117518",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2017-9315",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2017-9315",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2017-9315",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "ZDI",
            "id": "CVE-2017-9315",
            "trust": 0.7,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-38224",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201705-1393",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-117518",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-130"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-38224"
      },
      {
        "db": "VULHUB",
        "id": "VHN-117518"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-011143"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201705-1393"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-9315"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "Customer of Dahua IP camera or IP PTZ could submit relevant device information to receive a time limited temporary password from Dahua authorized dealer to reset the admin password. The algorithm used in this mechanism is potentially at risk of being compromised and subsequently utilized by attacker. Dahua IP Camera and IP PTZ Contains a cryptographic vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Dahua Technology IP Camera. Authentication is not required to exploit this vulnerability.The specific flaw exists within the disaster recovery password functionality. If the device uses its default settings, the password generation algorithm produces a predictable result. An attacker can leverage this vulnerability to gain control of the device under attack. Dahua IPC-HFW and others are network camera equipment of Dahua Company of China. There are security vulnerabilities in several Dahua products. An attacker could use this vulnerability to reset the administrator password. Dahua IPC-HFW, etc. The following products are affected: Dahua IPC-HFW1XXX Build 2015/07 to 2017/03; IPC-HDW1XXX Build 2015/07 to 2017/03; IPC-HDBW1XXX Build 2015/07 to 2017/03; IPC- HFW2XXX Build 2015/07 to 2017/03; IPC-HDW2XXX Build 2015/07 to 2017/03; IPC-HDBW2XXX Build 2015/07 to 2017/03; IPC-HFW4XXX Build 2015/07 to 2017 /03 version; IPC-HDW4XXX Build 2015/07 to 2017/03 version; IPC-HDBW4XXX Build 2015/07 to 2017/03 version; IPC-HF5XXX Build 2015/07 to 2017/03 version; IPC-HFW5XXX Build 2015/07 to 2017/03; IPC-HDW5XXX Build 2015/07 to 2017/03; IPC-HDBW5XXX Build 2015/07 to 2017/03; IPC-HF8XXX Build 2015/07 to 2017/03 Version; IPC-HFW8XXX Build 2015/07 to 2017/03; IPC-HDBW8XXX Build 2015/07 to 2017/03; IPC-EBW8XXX Build 2015/07 to 2017/03; IPC-PFW8xxx Build 2015/ 07 version to 2017/03 version; IPC-PDBW8xxx Build 2015/07 version to 2017/03 version; IPC-HUM8xxx Build 2015/07 version to 2017/03 version",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-9315"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-011143"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-130"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-38224"
      },
      {
        "db": "VULHUB",
        "id": "VHN-117518"
      }
    ],
    "trust": 2.88
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-9315",
        "trust": 3.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-011143",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-4956",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-130",
        "trust": 0.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201705-1393",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-38224",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-117518",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-130"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-38224"
      },
      {
        "db": "VULHUB",
        "id": "VHN-117518"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-011143"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201705-1393"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-9315"
      }
    ]
  },
  "id": "VAR-201711-1047",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-38224"
      },
      {
        "db": "VULHUB",
        "id": "VHN-117518"
      }
    ],
    "trust": 1.580443946875
  },
  "iot_taxonomy": {
    "_id": null,
    "data": [
      {
        "category": [
          "IoT",
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-38224"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:56:02.974000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.dahuasecurity.com/"
      },
      {
        "title": "Dahua Technology has issued an update to correct this vulnerability.",
        "trust": 0.7,
        "url": "http://www.dahuasecurity.com/Support/Cybersecurity/annoucementNotice/152"
      },
      {
        "title": "Patches for multiple Dahua product password reset vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/111791"
      },
      {
        "title": "Multiple Dahua Product security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=99835"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-130"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-38224"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-011143"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201705-1393"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "NVD-CWE-noinfo",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-310",
        "trust": 0.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-117518"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-011143"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-9315"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 2.3,
        "url": "http://www.dahuasecurity.com/annoucementsingle/security-advisory--admin-password-recovery-mechanism-in-some-dahua-ip-camera-and-ip-ptz-could-lead-to-security-risk_14731_221.html"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-9315"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-9315"
      },
      {
        "trust": 0.7,
        "url": "http://www.dahuasecurity.com/support/cybersecurity/annoucementnotice/152"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-130"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-38224"
      },
      {
        "db": "VULHUB",
        "id": "VHN-117518"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-011143"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201705-1393"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-9315"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "ZDI",
        "id": "ZDI-18-130",
        "ident": null
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-38224",
        "ident": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-117518",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-011143",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201705-1393",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2017-9315",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2018-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-130",
        "ident": null
      },
      {
        "date": "2017-12-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-38224",
        "ident": null
      },
      {
        "date": "2017-11-28T00:00:00",
        "db": "VULHUB",
        "id": "VHN-117518",
        "ident": null
      },
      {
        "date": "2018-01-09T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-011143",
        "ident": null
      },
      {
        "date": "2017-05-30T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201705-1393",
        "ident": null
      },
      {
        "date": "2017-11-28T19:29:00.400000",
        "db": "NVD",
        "id": "CVE-2017-9315",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2018-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-130",
        "ident": null
      },
      {
        "date": "2017-12-27T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-38224",
        "ident": null
      },
      {
        "date": "2019-10-03T00:00:00",
        "db": "VULHUB",
        "id": "VHN-117518",
        "ident": null
      },
      {
        "date": "2018-01-09T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-011143",
        "ident": null
      },
      {
        "date": "2019-10-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201705-1393",
        "ident": null
      },
      {
        "date": "2024-11-21T03:35:49.310000",
        "db": "NVD",
        "id": "CVE-2017-9315",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201705-1393"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "_id": null,
    "data": "Dahua IP Camera and  IP PTZ Cryptographic vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-011143"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "_id": null,
    "data": "encryption problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201705-1393"
      }
    ],
    "trust": 0.6
  }
}

Vulnerability from fkie_nvd
Published
2019-07-29 22:15
Modified
2024-11-21 04:42
Summary
The Amcrest IP2M-841B V2.520.AC00.18.R, Dahua IPC-XXBXX V2.622.0000000.9.R, Dahua IPC HX5X3X and HX4X3X V2.800.0000008.0.R, Dahua DH-IPC HX883X and DH-IPC-HX863X V2.622.0000000.7.R, Dahua DH-SD4XXXXX V2.623.0000000.7.R, Dahua DH-SD5XXXXX V2.623.0000000.1.R, Dahua DH-SD6XXXXX V2.640.0000000.2.R and V2.623.0000000.1.R, Dahua NVR5XX-4KS2 V3.216.0000006.0.R, Dahua NVR4XXX-4KS2 V3.216.0000006.0.R, and NVR2XXX-4KS2 do not require authentication to access the HTTP endpoint /videotalk. An unauthenticated, remote person can connect to this endpoint and potentionally listen to the audio of the capturing device.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amcrest:ip2m-841b_firmware:2.520.ac00.18.r:*:*:*:*:*:*:*",
              "matchCriteriaId": "227426AD-9C92-409F-B9F0-4ED65D1B1C8F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amcrest:ip2m-841b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "153619F4-378C-4584-BDBA-EA5CEC63133E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:dahua:dh-ipc-hx863x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F551EC96-4EB1-4CF0-AB88-7296268893E4",
              "versionEndExcluding": "2018-05-18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:dahua:dh-ipc-hx883x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAB9E21-DFA5-4063-A756-12FB0B3C74F7",
              "versionEndExcluding": "2018-05-18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:dahua:dh-sd4xxxxx:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3BE5E7B-328F-40E2-9C72-CA70E04CA121",
              "versionEndExcluding": "2018-05-18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:dahua:dh-sd5xxxxx:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B2940CE-D025-4F22-AE79-4658471D9C2B",
              "versionEndExcluding": "2018-05-18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:dahua:dh-sd6xxxxx:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E73BBAB3-F5DE-4AF6-BD84-7D79CDE3A28F",
              "versionEndExcluding": "2018-05-18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:dahua:ipc-hx4x3x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1331F66B-420A-4309-B489-58238D602796",
              "versionEndExcluding": "2018-05-18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:dahua:ipc-hx5x3x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AED3D80-0BFF-4C09-8618-FA421713885D",
              "versionEndExcluding": "2018-05-18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:dahua:ipc-xxbxx:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "767BC11A-F349-4B9F-9868-A8C2DBDC209D",
              "versionEndExcluding": "2018-05-18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:dahua:nvr2xxx-4ks2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E25D467-3BDE-4614-BB13-5ADD1E1FE750",
              "versionEndExcluding": "2018-05-18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:dahua:nvr4xxx-4ks2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4ACE5670-C425-4AB6-8566-D732B069A33E",
              "versionEndExcluding": "2018-05-18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:dahua:nvr5xxx-4ks2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B39D29AC-C227-4210-8C10-C4B1FF525EEE",
              "versionEndExcluding": "2018-05-18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Amcrest IP2M-841B V2.520.AC00.18.R, Dahua IPC-XXBXX V2.622.0000000.9.R, Dahua IPC HX5X3X and HX4X3X V2.800.0000008.0.R, Dahua DH-IPC HX883X and DH-IPC-HX863X V2.622.0000000.7.R, Dahua DH-SD4XXXXX V2.623.0000000.7.R, Dahua DH-SD5XXXXX V2.623.0000000.1.R, Dahua DH-SD6XXXXX V2.640.0000000.2.R and V2.623.0000000.1.R, Dahua NVR5XX-4KS2 V3.216.0000006.0.R, Dahua NVR4XXX-4KS2 V3.216.0000006.0.R, and NVR2XXX-4KS2 do not require authentication to access the HTTP endpoint /videotalk. An unauthenticated, remote person can connect to this endpoint and potentionally listen to the audio of the capturing device."
    },
    {
      "lang": "es",
      "value": "El Amcrest IP2M-841B V2.520.AC00.18.R, Dahua IPC-XXBXX V2.622.0000000.9.R, Dahua IPC HX5X3X y HX4X3X V2.800.0000008.0.R, Dahua DH-IPC HX883X y DH-IPC- HX863X V2.622.0000000.7.R, Dahua DH-SD4XXXXX V2.623.0000000.7.R, Dahua DH-SD5XXXXX V2.623.0000000.1.R, Dahua DH-SD6XXXXX V2.640.0000000.2.R y V2.623.0000000.1 .R, Dahua NVR5XX-4KS2 V3.216.0000006.0.R, Dahua NVR4XXX-4KS2 V3.216.0000006.0.R y NVR2XXX-4KS2 no requieren autenticaci\u00f3n para acceder al punto final HTTP / videotalk. Una persona remota no autenticada puede conectarse a este punto final y escuchar potencialmente el audio del dispositivo de captura."
    }
  ],
  "id": "CVE-2019-3948",
  "lastModified": "2024-11-21T04:42:55.520",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-07-29T22:15:12.253",
  "references": [
    {
      "source": "vulnreport@tenable.com",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/153813/Amcrest-Cameras-2.520.AC00.18.R-Unauthenticated-Audio-Streaming.html"
    },
    {
      "source": "vulnreport@tenable.com",
      "url": "https://us.dahuasecurity.com/wp-content/uploads/2019/08/Cybersecurity_2019-08-02.pdf"
    },
    {
      "source": "vulnreport@tenable.com",
      "url": "https://www.dahuasecurity.com/support/cybersecurity/details/627?us"
    },
    {
      "source": "vulnreport@tenable.com",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.tenable.com/security/research/tra-2019-36"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/153813/Amcrest-Cameras-2.520.AC00.18.R-Unauthenticated-Audio-Streaming.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://us.dahuasecurity.com/wp-content/uploads/2019/08/Cybersecurity_2019-08-02.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.dahuasecurity.com/support/cybersecurity/details/627?us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.tenable.com/security/research/tra-2019-36"
    }
  ],
  "sourceIdentifier": "vulnreport@tenable.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-306"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}