Search criteria

3 vulnerabilities found for IP2M-841B by Amcrest

CVE-2024-12984 (GCVE-0-2024-12984)

Vulnerability from cvelistv5 – Published: 2024-12-27 14:31 – Updated: 2024-12-27 14:53
VLAI?
Title
Amcrest IP2M-841B Web Interface webCapsConfig information disclosure
Summary
A vulnerability classified as problematic has been found in Amcrest IP2M-841B, IP2M-841W, IPC-IP2M-841B, IPC-IP3M-943B, IPC-IP3M-943S, IPC-IP3M-HX2B and IPC-IPM-721S up to 20241211. This affects an unknown part of the file /web_caps/webCapsConfig of the component Web Interface. The manipulation leads to information disclosure. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE
Assigner
Credits
netsecfish (VulDB User)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-12984",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-27T14:53:30.364152Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-27T14:53:46.976Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "modules": [
            "Web Interface"
          ],
          "product": "IP2M-841B",
          "vendor": "Amcrest",
          "versions": [
            {
              "status": "affected",
              "version": "20241211"
            }
          ]
        },
        {
          "modules": [
            "Web Interface"
          ],
          "product": "IP2M-841W",
          "vendor": "Amcrest",
          "versions": [
            {
              "status": "affected",
              "version": "20241211"
            }
          ]
        },
        {
          "modules": [
            "Web Interface"
          ],
          "product": "IPC-IP2M-841B",
          "vendor": "Amcrest",
          "versions": [
            {
              "status": "affected",
              "version": "20241211"
            }
          ]
        },
        {
          "modules": [
            "Web Interface"
          ],
          "product": "IPC-IP3M-943B",
          "vendor": "Amcrest",
          "versions": [
            {
              "status": "affected",
              "version": "20241211"
            }
          ]
        },
        {
          "modules": [
            "Web Interface"
          ],
          "product": "IPC-IP3M-943S",
          "vendor": "Amcrest",
          "versions": [
            {
              "status": "affected",
              "version": "20241211"
            }
          ]
        },
        {
          "modules": [
            "Web Interface"
          ],
          "product": "IPC-IP3M-HX2B",
          "vendor": "Amcrest",
          "versions": [
            {
              "status": "affected",
              "version": "20241211"
            }
          ]
        },
        {
          "modules": [
            "Web Interface"
          ],
          "product": "IPC-IPM-721S",
          "vendor": "Amcrest",
          "versions": [
            {
              "status": "affected",
              "version": "20241211"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "netsecfish (VulDB User)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability classified as problematic has been found in Amcrest IP2M-841B, IP2M-841W, IPC-IP2M-841B, IPC-IP3M-943B, IPC-IP3M-943S, IPC-IP3M-HX2B and IPC-IPM-721S up to 20241211. This affects an unknown part of the file /web_caps/webCapsConfig of the component Web Interface. The manipulation leads to information disclosure. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        },
        {
          "lang": "de",
          "value": "Es wurde eine Schwachstelle in Amcrest IP2M-841B, IP2M-841W, IPC-IP2M-841B, IPC-IP3M-943B, IPC-IP3M-943S, IPC-IP3M-HX2B and IPC-IPM-721S bis 20241211 entdeckt. Sie wurde als problematisch eingestuft. Es geht dabei um eine nicht klar definierte Funktion der Datei /web_caps/webCapsConfig der Komponente Web Interface. Dank der Manipulation mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 6.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
            "version": "4.0"
          }
        },
        {
          "cvssV3_1": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 5,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "Information Disclosure",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-284",
              "description": "Improper Access Controls",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-27T14:31:05.483Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "name": "VDB-289377 | Amcrest IP2M-841B Web Interface webCapsConfig information disclosure",
          "tags": [
            "vdb-entry"
          ],
          "url": "https://vuldb.com/?id.289377"
        },
        {
          "name": "VDB-289377 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/?ctiid.289377"
        },
        {
          "name": "Submit #461109 | Amcrest IP2M-841W, IPC-IP3M-HX2B, IPC-IP2M-841B, IPC-IPM-721S, IPC-IP3M-943B, IPC-IP3M-943S, IP2M-841B  N/A Information Disclosure",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vuldb.com/?submit.461109"
        },
        {
          "tags": [
            "exploit"
          ],
          "url": "https://netsecfish.notion.site/AMCREST-IP-Camera-Information-Disclosure-1596b683e67c8045ad10c16b3eed456f?pvs=4"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2024-12-27T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2024-12-27T01:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2024-12-27T08:54:48.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "Amcrest IP2M-841B Web Interface webCapsConfig information disclosure"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2024-12984",
    "datePublished": "2024-12-27T14:31:05.483Z",
    "dateReserved": "2024-12-27T07:49:43.408Z",
    "dateUpdated": "2024-12-27T14:53:46.976Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-12984 (GCVE-0-2024-12984)

Vulnerability from nvd – Published: 2024-12-27 14:31 – Updated: 2024-12-27 14:53
VLAI?
Title
Amcrest IP2M-841B Web Interface webCapsConfig information disclosure
Summary
A vulnerability classified as problematic has been found in Amcrest IP2M-841B, IP2M-841W, IPC-IP2M-841B, IPC-IP3M-943B, IPC-IP3M-943S, IPC-IP3M-HX2B and IPC-IPM-721S up to 20241211. This affects an unknown part of the file /web_caps/webCapsConfig of the component Web Interface. The manipulation leads to information disclosure. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE
Assigner
Credits
netsecfish (VulDB User)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-12984",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-27T14:53:30.364152Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-27T14:53:46.976Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "modules": [
            "Web Interface"
          ],
          "product": "IP2M-841B",
          "vendor": "Amcrest",
          "versions": [
            {
              "status": "affected",
              "version": "20241211"
            }
          ]
        },
        {
          "modules": [
            "Web Interface"
          ],
          "product": "IP2M-841W",
          "vendor": "Amcrest",
          "versions": [
            {
              "status": "affected",
              "version": "20241211"
            }
          ]
        },
        {
          "modules": [
            "Web Interface"
          ],
          "product": "IPC-IP2M-841B",
          "vendor": "Amcrest",
          "versions": [
            {
              "status": "affected",
              "version": "20241211"
            }
          ]
        },
        {
          "modules": [
            "Web Interface"
          ],
          "product": "IPC-IP3M-943B",
          "vendor": "Amcrest",
          "versions": [
            {
              "status": "affected",
              "version": "20241211"
            }
          ]
        },
        {
          "modules": [
            "Web Interface"
          ],
          "product": "IPC-IP3M-943S",
          "vendor": "Amcrest",
          "versions": [
            {
              "status": "affected",
              "version": "20241211"
            }
          ]
        },
        {
          "modules": [
            "Web Interface"
          ],
          "product": "IPC-IP3M-HX2B",
          "vendor": "Amcrest",
          "versions": [
            {
              "status": "affected",
              "version": "20241211"
            }
          ]
        },
        {
          "modules": [
            "Web Interface"
          ],
          "product": "IPC-IPM-721S",
          "vendor": "Amcrest",
          "versions": [
            {
              "status": "affected",
              "version": "20241211"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "netsecfish (VulDB User)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability classified as problematic has been found in Amcrest IP2M-841B, IP2M-841W, IPC-IP2M-841B, IPC-IP3M-943B, IPC-IP3M-943S, IPC-IP3M-HX2B and IPC-IPM-721S up to 20241211. This affects an unknown part of the file /web_caps/webCapsConfig of the component Web Interface. The manipulation leads to information disclosure. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        },
        {
          "lang": "de",
          "value": "Es wurde eine Schwachstelle in Amcrest IP2M-841B, IP2M-841W, IPC-IP2M-841B, IPC-IP3M-943B, IPC-IP3M-943S, IPC-IP3M-HX2B and IPC-IPM-721S bis 20241211 entdeckt. Sie wurde als problematisch eingestuft. Es geht dabei um eine nicht klar definierte Funktion der Datei /web_caps/webCapsConfig der Komponente Web Interface. Dank der Manipulation mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 6.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
            "version": "4.0"
          }
        },
        {
          "cvssV3_1": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 5,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "Information Disclosure",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-284",
              "description": "Improper Access Controls",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-27T14:31:05.483Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "name": "VDB-289377 | Amcrest IP2M-841B Web Interface webCapsConfig information disclosure",
          "tags": [
            "vdb-entry"
          ],
          "url": "https://vuldb.com/?id.289377"
        },
        {
          "name": "VDB-289377 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/?ctiid.289377"
        },
        {
          "name": "Submit #461109 | Amcrest IP2M-841W, IPC-IP3M-HX2B, IPC-IP2M-841B, IPC-IPM-721S, IPC-IP3M-943B, IPC-IP3M-943S, IP2M-841B  N/A Information Disclosure",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vuldb.com/?submit.461109"
        },
        {
          "tags": [
            "exploit"
          ],
          "url": "https://netsecfish.notion.site/AMCREST-IP-Camera-Information-Disclosure-1596b683e67c8045ad10c16b3eed456f?pvs=4"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2024-12-27T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2024-12-27T01:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2024-12-27T08:54:48.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "Amcrest IP2M-841B Web Interface webCapsConfig information disclosure"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2024-12984",
    "datePublished": "2024-12-27T14:31:05.483Z",
    "dateReserved": "2024-12-27T07:49:43.408Z",
    "dateUpdated": "2024-12-27T14:53:46.976Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

VAR-201907-0246

Vulnerability from variot - Updated: 2023-12-18 13:08

The Amcrest IP2M-841B V2.520.AC00.18.R, Dahua IPC-XXBXX V2.622.0000000.9.R, Dahua IPC HX5X3X and HX4X3X V2.800.0000008.0.R, Dahua DH-IPC HX883X and DH-IPC-HX863X V2.622.0000000.7.R, Dahua DH-SD4XXXXX V2.623.0000000.7.R, Dahua DH-SD5XXXXX V2.623.0000000.1.R, Dahua DH-SD6XXXXX V2.640.0000000.2.R and V2.623.0000000.1.R, Dahua NVR5XX-4KS2 V3.216.0000006.0.R, Dahua NVR4XXX-4KS2 V3.216.0000006.0.R, and NVR2XXX-4KS2 do not require authentication to access the HTTP endpoint /videotalk. An unauthenticated, remote person can connect to this endpoint and potentionally listen to the audio of the capturing device. Amcrest IP2M-841B IP Camera firmware Contains an authentication vulnerability.Information may be obtained. The Amcrest IP2M-841B is an IP camera from Amcrest

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201907-0246",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ip2m-841b",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "amcrest",
        "version": "2.520.ac00.18.r"
      },
      {
        "model": "dh-ipc-hx863x",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "dahua",
        "version": "2018-05-18"
      },
      {
        "model": "ipc-hx4x3x",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "dahua",
        "version": "2018-05-18"
      },
      {
        "model": "dh-ipc-hx883x",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "dahua",
        "version": "2018-05-18"
      },
      {
        "model": "nvr2xxx-4ks2",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "dahua",
        "version": "2018-05-18"
      },
      {
        "model": "nvr5xxx-4ks2",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "dahua",
        "version": "2018-05-18"
      },
      {
        "model": "dh-sd4xxxxx",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "dahua",
        "version": "2018-05-18"
      },
      {
        "model": "ipc-hx5x3x",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "dahua",
        "version": "2018-05-18"
      },
      {
        "model": "nvr4xxx-4ks2",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "dahua",
        "version": "2018-05-18"
      },
      {
        "model": "dh-sd5xxxxx",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "dahua",
        "version": "2018-05-18"
      },
      {
        "model": "ipc-xxbxx",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "dahua",
        "version": "2018-05-18"
      },
      {
        "model": "dh-sd6xxxxx",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "dahua",
        "version": "2018-05-18"
      },
      {
        "model": "dh-ipc-hx863x",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "model": "dh-ipc-hx883x",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "model": "dh-sd4xxxxx",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "model": "dh-sd5xxxxx",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "model": "dh-sd6xxxxx",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "model": "ipc-hx4x3x",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "model": "ipc-hx5x3x",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "model": "ipc-xxbxx",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "model": "nvr2xxx-4ks2",
        "scope": null,
        "trust": 0.8,
        "vendor": "dahua",
        "version": null
      },
      {
        "model": "ip2m-841b 2.520.ac00.18.r",
        "scope": null,
        "trust": 0.6,
        "vendor": "amcrest",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25804"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007425"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-3948"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:amcrest:ip2m-841b_firmware:2.520.ac00.18.r:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:amcrest:ip2m-841b:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:dahua:dh-sd5xxxxx:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "2018-05-18",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:dahua:ipc-hx4x3x:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "2018-05-18",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:dahua:ipc-xxbxx:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "2018-05-18",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:dahua:dh-ipc-hx863x:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "2018-05-18",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:dahua:dh-ipc-hx883x:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "2018-05-18",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:dahua:ipc-hx5x3x:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "2018-05-18",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:dahua:nvr2xxx-4ks2:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "2018-05-18",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:dahua:nvr4xxx-4ks2:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "2018-05-18",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:dahua:nvr5xxx-4ks2:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "2018-05-18",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:dahua:dh-sd4xxxxx:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "2018-05-18",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:dahua:dh-sd6xxxxx:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "2018-05-18",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-3948"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Jacob Baines",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1485"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2019-3948",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 5.0,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2019-3948",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.9,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.4,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2019-25804",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-155383",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 7.5,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2019-3948",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2019-3948",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2019-25804",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201907-1485",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-155383",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2019-3948",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25804"
      },
      {
        "db": "VULHUB",
        "id": "VHN-155383"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-3948"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007425"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-3948"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1485"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The Amcrest IP2M-841B V2.520.AC00.18.R, Dahua IPC-XXBXX V2.622.0000000.9.R, Dahua IPC HX5X3X and HX4X3X V2.800.0000008.0.R, Dahua DH-IPC HX883X and DH-IPC-HX863X V2.622.0000000.7.R, Dahua DH-SD4XXXXX V2.623.0000000.7.R, Dahua DH-SD5XXXXX V2.623.0000000.1.R, Dahua DH-SD6XXXXX V2.640.0000000.2.R and V2.623.0000000.1.R, Dahua NVR5XX-4KS2 V3.216.0000006.0.R, Dahua NVR4XXX-4KS2 V3.216.0000006.0.R, and NVR2XXX-4KS2 do not require authentication to access the HTTP endpoint /videotalk. An unauthenticated, remote person can connect to this endpoint and potentionally listen to the audio of the capturing device. Amcrest IP2M-841B IP Camera firmware Contains an authentication vulnerability.Information may be obtained. The Amcrest IP2M-841B is an IP camera from Amcrest",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-3948"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007425"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25804"
      },
      {
        "db": "VULHUB",
        "id": "VHN-155383"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-3948"
      }
    ],
    "trust": 2.34
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=47188",
        "trust": 0.1,
        "type": "exploit"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2019-3948"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-3948",
        "trust": 3.2
      },
      {
        "db": "TENABLE",
        "id": "TRA-2019-36",
        "trust": 2.6
      },
      {
        "db": "PACKETSTORM",
        "id": "153813",
        "trust": 1.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007425",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1485",
        "trust": 0.7
      },
      {
        "db": "EXPLOIT-DB",
        "id": "47188",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25804",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-155383",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-3948",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25804"
      },
      {
        "db": "VULHUB",
        "id": "VHN-155383"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-3948"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007425"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-3948"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1485"
      }
    ]
  },
  "id": "VAR-201907-0246",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25804"
      },
      {
        "db": "VULHUB",
        "id": "VHN-155383"
      }
    ],
    "trust": 1.3666667
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25804"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:08:02.821000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "IP2M-841B (Black)",
        "trust": 0.8,
        "url": "https://amcrest.com/amcrest-1080p-wifi-video-security-ip-camera-pt.html"
      },
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.dahuasecurity.com/"
      },
      {
        "title": "AmcrestIP2M-841B authentication bypass vulnerability patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/173073"
      },
      {
        "title": "Amcrest IP2M-841B Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=95601"
      },
      {
        "title": "Goby",
        "trust": 0.1,
        "url": "https://github.com/retr0-13/goby "
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/20142995/goby "
      },
      {
        "title": "sec-daily-2019",
        "trust": 0.1,
        "url": "https://github.com/alphaseclab/sec-daily-2019 "
      },
      {
        "title": "Threatpost",
        "trust": 0.1,
        "url": "https://threatpost.com/trivial-bug-turns-home-security-cameras-into-listening-posts/146835/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25804"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-3948"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007425"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1485"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-306",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-287",
        "trust": 0.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-155383"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007425"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-3948"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.0,
        "url": "http://packetstormsecurity.com/files/153813/amcrest-cameras-2.520.ac00.18.r-unauthenticated-audio-streaming.html"
      },
      {
        "trust": 2.6,
        "url": "https://www.tenable.com/security/research/tra-2019-36"
      },
      {
        "trust": 2.0,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3948"
      },
      {
        "trust": 1.8,
        "url": "https://us.dahuasecurity.com/wp-content/uploads/2019/08/cybersecurity_2019-08-02.pdf"
      },
      {
        "trust": 1.8,
        "url": "https://www.dahuasecurity.com/support/cybersecurity/details/627?us"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-3948"
      },
      {
        "trust": 0.7,
        "url": "https://www.exploit-db.com/exploits/47188"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/306.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://threatpost.com/trivial-bug-turns-home-security-cameras-into-listening-posts/146835/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25804"
      },
      {
        "db": "VULHUB",
        "id": "VHN-155383"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-3948"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007425"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-3948"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1485"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25804"
      },
      {
        "db": "VULHUB",
        "id": "VHN-155383"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-3948"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007425"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-3948"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1485"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-08-05T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-25804"
      },
      {
        "date": "2019-07-29T00:00:00",
        "db": "VULHUB",
        "id": "VHN-155383"
      },
      {
        "date": "2019-07-29T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-3948"
      },
      {
        "date": "2019-08-09T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-007425"
      },
      {
        "date": "2019-07-29T22:15:12.253000",
        "db": "NVD",
        "id": "CVE-2019-3948"
      },
      {
        "date": "2019-07-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201907-1485"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-08-05T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-25804"
      },
      {
        "date": "2020-08-24T00:00:00",
        "db": "VULHUB",
        "id": "VHN-155383"
      },
      {
        "date": "2020-08-24T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-3948"
      },
      {
        "date": "2019-08-09T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-007425"
      },
      {
        "date": "2020-08-24T17:37:01.140000",
        "db": "NVD",
        "id": "CVE-2019-3948"
      },
      {
        "date": "2020-08-25T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201907-1485"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1485"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Amcrest IP2M-841B IP Camera firmware Authentication vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007425"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "access control error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1485"
      }
    ],
    "trust": 0.6
  }
}