CVE-2020-24217 (GCVE-0-2020-24217)
Vulnerability from cvelistv5
Published
2020-10-06 13:05
Modified
2024-08-04 15:12
Severity ?
CWE
  • n/a
Summary
An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. The file-upload endpoint does not enforce authentication. Attackers can send an unauthenticated HTTP request to upload a custom firmware component, possibly in conjunction with command injection, to achieve arbitrary code execution.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T15:12:07.203Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.kb.cert.org/vuls/id/896979"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/159599/HiSilicon-Video-Encoder-Malicious-Firmware-Code-Execution.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/159597/HiSilicon-Video-Encoder-Command-Injection.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2020-09-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. The file-upload endpoint does not enforce authentication. Attackers can send an unauthenticated HTTP request to upload a custom firmware component, possibly in conjunction with command injection, to achieve arbitrary code execution."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-10-19T17:06:20",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.kb.cert.org/vuls/id/896979"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/159599/HiSilicon-Video-Encoder-Malicious-Firmware-Code-Execution.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/159597/HiSilicon-Video-Encoder-Command-Injection.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-24217",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. The file-upload endpoint does not enforce authentication. Attackers can send an unauthenticated HTTP request to upload a custom firmware component, possibly in conjunction with command injection, to achieve arbitrary code execution."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.kb.cert.org/vuls/id/896979",
              "refsource": "MISC",
              "url": "https://www.kb.cert.org/vuls/id/896979"
            },
            {
              "name": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/",
              "refsource": "MISC",
              "url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
            },
            {
              "name": "http://packetstormsecurity.com/files/159599/HiSilicon-Video-Encoder-Malicious-Firmware-Code-Execution.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/159599/HiSilicon-Video-Encoder-Malicious-Firmware-Code-Execution.html"
            },
            {
              "name": "http://packetstormsecurity.com/files/159597/HiSilicon-Video-Encoder-Command-Injection.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/159597/HiSilicon-Video-Encoder-Command-Injection.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-24217",
    "datePublished": "2020-10-06T13:05:36",
    "dateReserved": "2020-08-13T00:00:00",
    "dateUpdated": "2024-08-04T15:12:07.203Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2020-24217\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2020-10-06T14:15:12.337\",\"lastModified\":\"2024-11-21T05:14:30.763\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. The file-upload endpoint does not enforce authentication. Attackers can send an unauthenticated HTTP request to upload a custom firmware component, possibly in conjunction with command injection, to achieve arbitrary code execution.\"},{\"lang\":\"es\",\"value\":\"Se detect\u00f3 un problema en la aplicaci\u00f3n box en los codificadores de video IPTV/H.264/H.265 basados ??en HiSilicon. El endpoint de carga de archivos no aplica autenticaci\u00f3n.\u0026#xa0;Unos atacantes pueden enviar una petici\u00f3n HTTP no autenticada para cargar un componente de firmware personalizado, posiblemente junto con una inyecci\u00f3n de comandos, para lograr una ejecuci\u00f3n de c\u00f3digo arbitraria\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-306\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:szuray:iptv\\\\/h.264_video_encoder_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96950D0B-9D3C-432F-B1DC-C7E42409F92E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uaioe264-1u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6772748B-DB2F-4125-BC8E-0DCCDFED5F0C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uce264-1-mini:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9AE7634-FFF7-4AE8-98D5-067B28DD96D6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uce264-1wb-mini:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E0E73A8-C4E7-4C05-803F-912F4E21270F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uce264-4-1u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBACB14A-712C-4DE0-A9BD-1BF2F6816FE4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uce264-8-1u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF1E322A-DFD5-4D69-8A15-8BA5139A9778\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhae264-16:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09FC49AC-7F1C-4E34-8177-08E56355818B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhce264-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB155809-04A8-43D7-BC84-13EFF98366B9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhce264-16p32:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7E94025-4A64-4CAA-BA50-9125E1FC4AE3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhce264-1p2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D9014E7-CC03-4C8A-9843-F9FA07688D1B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhce264-1p2-1u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C31A218C-B38B-42F2-843A-4BE90E77CFF5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhce264-1s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"881936E0-4039-4F9C-94CD-14F78AB410F9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhce264-1w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B727B793-08CD-4C52-84DE-EDA328E417F0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhce264-1ws:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4EB82D6-F526-401B-9EFB-3EA901C08F67\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhce264-4p8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA84AFBF-4A0D-4D25-A49C-E2EAAD6BF125\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe264-1-4k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF980787-641D-446D-AA1D-743F01F35990\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe264-16:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC4811B8-C8F0-4B82-BA29-EDBFF5A8F757\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe264-16l-3u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7202172A-EF50-4BF0-ACFF-6E46D6461F03\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe264-16s-2u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEC5476D-C310-483A-BE8A-92339449B9CA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe264-1l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28A40A8D-FE09-427C-B6EB-69C171F0D893\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe264-1l-4k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C1B9FAB-7259-44C6-B847-31D41A919CC0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe264-1lw:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"604607A9-316B-491A-BF05-25A290ACC000\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe264-1s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A58748D-5CE3-4D4E-ADAE-01686CA6179A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe264-1s-mini:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F077FD0E-CADB-4D91-B3EC-C88E3210DC7C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe264-1w-mini:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7968808C-37EF-47A6-A676-2C355834CBE1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe264-1wb-4g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8E5E944-7CDA-4945-97EB-3BE6AD52FABA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe264-1wb-mini:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"962EAD68-5CA1-4467-A2DA-8E6F04EFCB54\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe264-1wbs-2b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A680278C-0B4F-4693-8DE0-07276B014B34\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe264-1wbs-mini:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46CE60FE-EAD2-4D22-A353-C520510ED39E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe264-1ws-mini:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFAB7E7C-EE61-4210-9798-55E76248C054\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe264-2-1u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B4609D6-3CD7-4EE7-9B0B-4F3137481118\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe264-4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61011F2F-4DFA-457E-8748-9CD69541F094\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe264-4-1u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D0D914D-4493-4B22-B865-267F0BC6AB1B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe264-4l-1u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C54D0860-2377-431B-9B2D-1994955194DE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe264-8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FD70522-EEC0-446B-9D79-504E218459FF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe264-8-1u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"208AAB27-2650-4301-A7AE-82E2C0965C09\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe264-8l-3u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85CAA5AB-FF37-4D6B-957C-A030928D5AC7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe264-8s-2u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"639D6035-DC3C-46F4-9B37-65DCF34D222A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:use264-16-3u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"647F1835-8012-47C9-9B6D-A596EB534B7A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:use264-1l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7FA66B0-5442-4300-AD4D-593F87024E5E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:use264-1l-1u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8962B531-7224-4F8C-89C9-3A77D45BEC8F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:use264-1l-mini:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10ED0FBA-AE37-4147-B82B-76B2A9B50133\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:use264-1lw:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F05BD245-85DD-4C2C-ACD9-B34A3D909785\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:use264-1wb-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83C2D275-06A6-4D7B-89E4-89B332CED051\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:use264-4l-1u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDA97F59-C447-4B2E-990A-4549E2E81CAD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:use264-8-1u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6D4D394-EA33-41E1-91D2-BB38FEBF165F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uve264-1l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B70B884-1671-4E9A-93F1-8BD18BB4C0B5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uve264-1lw:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98CB39B7-4958-4492-B756-658385213BA9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:szuray:iptv\\\\/h.265_video_encoder_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3E17D32-939F-47DF-B6A9-018A5BA00E4F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uaioe265-1u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E2650DF-89F0-4AD6-B7FE-FD3BDE3D2B17\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhae265-1-mini:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F08B9C9-E5D8-4C7C-A887-99295D60A212\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhae265-1wb-mini:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3A44F97-E862-4F58-92D1-EAA294153D95\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhae265-4-1u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86C44E3E-CFB1-422A-8F01-614CBD459922\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe265-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BCCBB90-E556-4720-8BB8-EEE7AEE593F6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe265-1-1u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99AA308F-9F99-4361-99BC-17131197DC3D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe265-1-4k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63366CBD-DC0A-4F77-842C-E05EA808AD32\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe265-1-mini:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B3B018B-5F88-434E-86C2-BA2D099DFD2F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe265-16-3u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E44D6FD0-FB79-4951-8C01-61955B4DEAA7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe265-16l-3u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33195DA8-7870-4E0D-B1FB-1F74B9061822\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe265-1l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6117C474-B80D-4074-A7B4-A6B53981047E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe265-1lw:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46C9EEFE-815C-46AC-8578-D8CA6089AE85\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe265-1s-4k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EFEE019-F095-4245-89C6-10E1072A2E8B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe265-1s-mini:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2261B449-BBD2-40DC-AB65-1C58C6053732\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe265-1w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA479B8B-A9DC-4A58-AE54-F25F248F2303\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe265-1w-4k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"615E1879-1645-4BC1-A75F-E6B054D53DE3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe265-1w-mini:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95D32DE8-5EE8-457A-BCE6-426E8E299725\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe265-1wb-4g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EAB9908-E7B3-4326-99E4-3250055A48A9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe265-1wb-mini:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7381F37B-28A3-4CF4-A7F8-B055A5030BB4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe265-1wbs-mini:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B542903-8E73-4FE5-A5E6-4E32324434F3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe265-2-1u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C182396A-252F-4C53-BA71-F9F4D8611E98\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe265-4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9CE953F-6D7E-4C39-A678-DF50963FBB11\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe265-4-1u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14691D7F-00AD-44EB-A039-986C8BD1EB9D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe265-4s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"191DE899-5F31-4F9D-8994-07A628250262\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe265-4s-1u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86BDD6F5-C2F8-456D-BEB9-EA9D7978511C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe265-8-1u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A226DEE-F7BB-4B17-9955-16E2A7367BB6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe265-8l-3u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40B2DC48-1442-441E-B31C-D6FCFF7739E0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhe265-8s-1u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFC976D3-ED77-48C3-B0BF-45A5A9632324\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uhse265-1u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D85ED04-7865-4E83-8821-2A572DD99718\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:use265-1-1u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25645C33-B714-4590-AABE-3F70C8281597\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:use265-1-mini:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60379E33-5223-4BA2-8D8B-82279170EC7E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:use265-16l-3u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F654B4D-511C-4EA3-B4B6-2F1723331807\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:use265-1l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76FB5B9D-85FB-42A1-A842-3B249898E32A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:use265-1l-1u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"466BBB89-98D0-473B-9EFE-A1E9A24BFCAD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:use265-1l-mini:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E08B012C-6AF8-438F-B3D7-50FCFCB240CF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:use265-1lw:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60C050DF-C096-44A0-9990-FE31F92CE0BB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:use265-1w-mini:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8444D38-2B6B-467D-B6CE-EDA526F6C461\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:use265-1wb-4g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"407CD871-F878-4354-A9A5-FDA12C8902E7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:use265-1wb-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2780373-207F-45EB-98CA-78D080C78963\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:use265-1wb-mini:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46EC75C6-7A52-4E67-9D2D-BE77D88882C6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:use265-2-1u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AD74A9D-5A22-4959-825D-4B334FECF820\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:use265-4-1u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AB5D9AE-B2CE-469D-8A74-EC7B8707CE23\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:use265-4l-1u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC802BF6-799A-47C6-AE20-4309031DD27E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:use265-8-1u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A4C5C5A-C0C1-459C-9D4B-F5D55479B446\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uve265-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB1E5C59-6C6E-446D-B2E4-81CB996082B8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:szuray:uve265-1w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECA9B1FC-728C-4DCD-963B-92BC4F37188B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:jtechdigital:h.264_iptv_encoder_1080p\\\\@60hz_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A83D2BA-4654-481A-A3AC-762ED2EE0FC7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:jtechdigital:h.264_iptv_encoder_1080p\\\\@60hz:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A25DA2BA-F7B2-4C3A-BFD5-ACF5A84AA627\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:provideoinstruments:vecaster-hd-h264_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"251AB76F-DAD8-4592-B0F4-D4D6A80D1E50\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:provideoinstruments:vecaster-hd-h264:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4982E9FC-E6FC-44BA-AEAF-FCEF7344F727\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:provideoinstruments:vecaster-hd-hevc_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6DE56A5-7EEA-44E5-85B8-F6DA8B0AC140\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:provideoinstruments:vecaster-hd-hevc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5E0315F-76F1-4FE7-B850-6588D5855AD9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:provideoinstruments:vecaster-4k-hevc_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9583183-1BCD-4AF6-ACB8-FA417C720801\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:provideoinstruments:vecaster-4k-hevc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01492DDD-EBA7-4F49-B8D8-0E7B75B76F3E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:provideoinstruments:vecaster-hd-sdi_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C996B50-93B2-44CD-A623-5ECC17E1C471\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:provideoinstruments:vecaster-hd-sdi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCF9D373-A23E-4FAF-8C29-09D508615A69\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/159597/HiSilicon-Video-Encoder-Command-Injection.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/159599/HiSilicon-Video-Encoder-Malicious-Firmware-Code-Execution.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/896979\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://packetstormsecurity.com/files/159597/HiSilicon-Video-Encoder-Command-Injection.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/159599/HiSilicon-Video-Encoder-Malicious-Firmware-Code-Execution.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/896979\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…