Search criteria
6 vulnerabilities found for ahb7804r-mh-v2_firmware by xiongmaitech
FKIE_CVE-2021-41506
Vulnerability from fkie_nvd - Published: 2022-06-30 13:15 - Updated: 2024-11-21 06:26
Severity ?
Summary
Xiaongmai AHB7008T-MH-V2, AHB7804R-ELS, AHB7804R-MH-V2, AHB7808R-MS-V2, AHB7808R-MS, AHB7808T-MS-V2, AHB7804R-LMS, HI3518_50H10L_S39 V4.02.R11.7601.Nat.Onvif.20170420, V4.02.R11.Nat.Onvif.20160422, V4.02.R11.7601.Nat.Onvif.20170424, V4.02.R11.Nat.Onvif.20170327, V4.02.R11.Nat.Onvif.20161205, V4.02.R11.Nat.20170301, V4.02.R12.Nat.OnvifS.20170727 is affected by a backdoor in the macGuarder and dvrHelper binaries of DVR/NVR/IP camera firmware due to static root account credentials in the system.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://github.com/Snawoot/hisilicon-dvr-telnet | Third Party Advisory | |
| cve@mitre.org | https://github.com/tothi/hs-dvr-telnet | Third Party Advisory | |
| cve@mitre.org | https://habr.com/en/post/486856/ | Exploit, Third Party Advisory | |
| cve@mitre.org | https://www.xiongmaitech.com/en/index.php/news/info/12/68 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/Snawoot/hisilicon-dvr-telnet | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/tothi/hs-dvr-telnet | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://habr.com/en/post/486856/ | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.xiongmaitech.com/en/index.php/news/info/12/68 | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| xiongmaitech | ahb7008t-mh-v2_firmware | 4.02.r11.7601.nat.onvif.20170420 | |
| xiongmaitech | ahb7008t-mh-v2 | - | |
| xiongmaitech | ahb7804r-els_firmware | 4.02.r11.nat.onvif.20160422 | |
| xiongmaitech | ahb7804r-els | - | |
| xiongmaitech | ahb7804r-mh-v2_firmware | 4.02.r11.7601.nat.onvif.20170424 | |
| xiongmaitech | ahb7804r-mh-v2 | - | |
| xiongmaitech | ahb7808r-ms-v2_firmware | 4.02.r11.nat.onvif.20170327 | |
| xiongmaitech | ahb7808r-ms-v2 | - | |
| xiongmaitech | ahb7808r-ms_firmware | 4.02.r11.nat.onvif.20160328 | |
| xiongmaitech | ahb7808r-ms | - | |
| xiongmaitech | ahb7808t-ms-v2_firmware | 4.02.r11.nat.onvifc.20161205 | |
| xiongmaitech | ahb7808t-ms-v2 | - | |
| xiongmaitech | ahb7804r-lms_firmware | 4.02.r11.nat.20170301 | |
| xiongmaitech | ahb7804r-lms | - | |
| xiongmaitech | hi3518e_50h10l_s39_firmware | 4.02.r12.nat.onvifs.20170727 | |
| xiongmaitech | hi3518e_50h10l_s39 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xiongmaitech:ahb7008t-mh-v2_firmware:4.02.r11.7601.nat.onvif.20170420:*:*:*:*:*:*:*",
"matchCriteriaId": "CBA6D92B-BF43-439D-871D-A2892CF9AEFB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xiongmaitech:ahb7008t-mh-v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBF088E7-3524-457F-8EEA-701D47E8B74D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xiongmaitech:ahb7804r-els_firmware:4.02.r11.nat.onvif.20160422:*:*:*:*:*:*:*",
"matchCriteriaId": "3D94C26C-2A1A-4C76-A7DA-2EB7189E6DB5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xiongmaitech:ahb7804r-els:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8585D82-151C-4D41-BC74-505607025BA5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xiongmaitech:ahb7804r-mh-v2_firmware:4.02.r11.7601.nat.onvif.20170424:*:*:*:*:*:*:*",
"matchCriteriaId": "6B3CBE03-12BB-4E51-9714-F84989457EDD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xiongmaitech:ahb7804r-mh-v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53BDF5A2-9D42-4431-8909-3C55338C3C41",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xiongmaitech:ahb7808r-ms-v2_firmware:4.02.r11.nat.onvif.20170327:*:*:*:*:*:*:*",
"matchCriteriaId": "8CE84728-4A36-46E5-83E2-9C53BFFA22E4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xiongmaitech:ahb7808r-ms-v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A582697F-4F26-4A48-8501-794133B9566F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xiongmaitech:ahb7808r-ms_firmware:4.02.r11.nat.onvif.20160328:*:*:*:*:*:*:*",
"matchCriteriaId": "F6C8AF2E-84FF-4B0F-9761-82779E8C414F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xiongmaitech:ahb7808r-ms:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CD6C0E4-F203-4DCA-ABFA-7045B642F311",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xiongmaitech:ahb7808t-ms-v2_firmware:4.02.r11.nat.onvifc.20161205:*:*:*:*:*:*:*",
"matchCriteriaId": "BE549C20-763C-4332-BC2F-537290EE87F9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xiongmaitech:ahb7808t-ms-v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E344CEF-B455-4851-BC2C-708C5A70FC9B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xiongmaitech:ahb7804r-lms_firmware:4.02.r11.nat.20170301:*:*:*:*:*:*:*",
"matchCriteriaId": "D924A684-198F-4774-8312-5442D44DF406",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xiongmaitech:ahb7804r-lms:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1064493C-BE25-4A62-BBCC-F1C4F9B1E712",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xiongmaitech:hi3518e_50h10l_s39_firmware:4.02.r12.nat.onvifs.20170727:*:*:*:*:*:*:*",
"matchCriteriaId": "1D05B1EF-6A64-474C-8349-01563502B34A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xiongmaitech:hi3518e_50h10l_s39:-:*:*:*:*:*:*:*",
"matchCriteriaId": "322E389F-ED78-4F6C-AA50-DAF9CE257484",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Xiaongmai AHB7008T-MH-V2, AHB7804R-ELS, AHB7804R-MH-V2, AHB7808R-MS-V2, AHB7808R-MS, AHB7808T-MS-V2, AHB7804R-LMS, HI3518_50H10L_S39 V4.02.R11.7601.Nat.Onvif.20170420, V4.02.R11.Nat.Onvif.20160422, V4.02.R11.7601.Nat.Onvif.20170424, V4.02.R11.Nat.Onvif.20170327, V4.02.R11.Nat.Onvif.20161205, V4.02.R11.Nat.20170301, V4.02.R12.Nat.OnvifS.20170727 is affected by a backdoor in the macGuarder and dvrHelper binaries of DVR/NVR/IP camera firmware due to static root account credentials in the system."
},
{
"lang": "es",
"value": "Xiaongmai AHB7008T-MH-V2, AHB7804R-ELS, AHB7804R-MH-V2, AHB7808R-MS-V2, AHB7808R-MS, AHB7808T-MS-V2, AHB7804R-LMS, HI3518_50H10L_S39 V4.02.R11.7601.Nat.Onvif.20170420, V4.02.R11.Nat.Onvif.20160422, V4.02.R11.7601.Nat.Onvif.20170424, V4.02.R11.Nat.Onvif.20170327, V4.02.R11.Nat.Onvif.20161205, V4.02.R11.Nat.20170301, V4.02.R12.Nat.OnvifS.20170727 est\u00e1 afectado por un backdoor en los binarios macGuarder y dvrHelper del firmware de las c\u00e1maras DVR/NVR/IP debido a credenciales est\u00e1ticas de la cuenta root en el sistema"
}
],
"id": "CVE-2021-41506",
"lastModified": "2024-11-21T06:26:20.530",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-06-30T13:15:08.350",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Snawoot/hisilicon-dvr-telnet"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/tothi/hs-dvr-telnet"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://habr.com/en/post/486856/"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.xiongmaitech.com/en/index.php/news/info/12/68"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Snawoot/hisilicon-dvr-telnet"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/tothi/hs-dvr-telnet"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://habr.com/en/post/486856/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.xiongmaitech.com/en/index.php/news/info/12/68"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2020-22253
Vulnerability from fkie_nvd - Published: 2022-04-06 23:15 - Updated: 2024-11-21 05:13
Severity ?
Summary
Xiongmai Technology Co devices AHB7008T-MH-V2, AHB7804R-ELS, AHB7804R-MH-V2, AHB7808R-MS-V2, AHB7808R-MS, AHB7808T-MS-V2, AHB7804R-LMS, and HI3518E_50H10L_S39 were all discovered to have port 9530 open which allows unauthenticated attackers to make arbitrary Telnet connections with the victim device.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://www.xiongmaitech.com/en/index.php/news/info/12/68 | Mitigation, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.xiongmaitech.com/en/index.php/news/info/12/68 | Mitigation, Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| xiongmaitech | ahb7008t-mh-v2_firmware | 4.02.r11.7601.nat.onvifc.20170420 | |
| xiongmaitech | ahb7008t-mh-v2 | - | |
| xiongmaitech | ahb7804r-els_firmware | 4.02.r11.nat.onvifc.20160422 | |
| xiongmaitech | ahb7804r-els | - | |
| xiongmaitech | ahb7804r-mh-v2_firmware | 4.02.r11.7601.nat.onvifc.20170424 | |
| xiongmaitech | ahb7804r-mh-v2 | - | |
| xiongmaitech | ahb7808r-ms-v2_firmware | 4.02.r11.nat.onvifc.20170327 | |
| xiongmaitech | ahb7808r-ms-v2 | - | |
| xiongmaitech | ahb7808r-ms_firmware | 4.02.r11.nat.onvifc.20170328 | |
| xiongmaitech | ahb7808r-ms | - | |
| xiongmaitech | ahb7808t-ms-v2_firmware | 4.02.r11.nat.onvifc.20161205 | |
| xiongmaitech | ahb7808t-ms-v2 | - | |
| xiongmaitech | ahb7804r-lms_firmware | 4.02.r11.nat.onvifc.20170301 | |
| xiongmaitech | ahb7804r-lms | - | |
| xiongmaitech | hi3518e_50h10l_s39_firmware | 4.02.r12.nat.onvifs.20170727_all | |
| xiongmaitech | hi3518e_50h10l_s39 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xiongmaitech:ahb7008t-mh-v2_firmware:4.02.r11.7601.nat.onvifc.20170420:*:*:*:*:*:*:*",
"matchCriteriaId": "D2337743-6515-4D1E-8B6B-0259E080BE3D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xiongmaitech:ahb7008t-mh-v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBF088E7-3524-457F-8EEA-701D47E8B74D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xiongmaitech:ahb7804r-els_firmware:4.02.r11.nat.onvifc.20160422:*:*:*:*:*:*:*",
"matchCriteriaId": "B86CFDB2-430D-4922-B9E3-789D9A99BF7D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xiongmaitech:ahb7804r-els:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8585D82-151C-4D41-BC74-505607025BA5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xiongmaitech:ahb7804r-mh-v2_firmware:4.02.r11.7601.nat.onvifc.20170424:*:*:*:*:*:*:*",
"matchCriteriaId": "21E69506-0B0F-4516-952C-B5341828CC9E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xiongmaitech:ahb7804r-mh-v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53BDF5A2-9D42-4431-8909-3C55338C3C41",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xiongmaitech:ahb7808r-ms-v2_firmware:4.02.r11.nat.onvifc.20170327:*:*:*:*:*:*:*",
"matchCriteriaId": "83377CE0-7AF5-40E8-9F36-187580F57FD2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xiongmaitech:ahb7808r-ms-v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A582697F-4F26-4A48-8501-794133B9566F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xiongmaitech:ahb7808r-ms_firmware:4.02.r11.nat.onvifc.20170328:*:*:*:*:*:*:*",
"matchCriteriaId": "2682CEE3-77F0-4933-ABD4-8BA52FDB3C4E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xiongmaitech:ahb7808r-ms:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CD6C0E4-F203-4DCA-ABFA-7045B642F311",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xiongmaitech:ahb7808t-ms-v2_firmware:4.02.r11.nat.onvifc.20161205:*:*:*:*:*:*:*",
"matchCriteriaId": "BE549C20-763C-4332-BC2F-537290EE87F9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xiongmaitech:ahb7808t-ms-v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E344CEF-B455-4851-BC2C-708C5A70FC9B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xiongmaitech:ahb7804r-lms_firmware:4.02.r11.nat.onvifc.20170301:*:*:*:*:*:*:*",
"matchCriteriaId": "38952070-2328-437D-8CDA-24151D101FE7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xiongmaitech:ahb7804r-lms:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1064493C-BE25-4A62-BBCC-F1C4F9B1E712",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xiongmaitech:hi3518e_50h10l_s39_firmware:4.02.r12.nat.onvifs.20170727_all:*:*:*:*:*:*:*",
"matchCriteriaId": "CE275C8A-C82B-48D1-88D2-81804F072139",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xiongmaitech:hi3518e_50h10l_s39:-:*:*:*:*:*:*:*",
"matchCriteriaId": "322E389F-ED78-4F6C-AA50-DAF9CE257484",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Xiongmai Technology Co devices AHB7008T-MH-V2, AHB7804R-ELS, AHB7804R-MH-V2, AHB7808R-MS-V2, AHB7808R-MS, AHB7808T-MS-V2, AHB7804R-LMS, and HI3518E_50H10L_S39 were all discovered to have port 9530 open which allows unauthenticated attackers to make arbitrary Telnet connections with the victim device."
},
{
"lang": "es",
"value": "Los dispositivos de Xiongmai Technology Co AHB7008T-MH-V2, AHB7804R-ELS, AHB7804R-MH-V2, AHB7808R-MS-V2, AHB7808R-MS, AHB7808T-MS-V2, AHB7804R-LMS y HI3518E_50H10L_S39, presentan el puerto 9530 abierto, lo que permite a atacantes no autenticados realizar conexiones Telnet arbitrarias con el dispositivo v\u00edctima"
}
],
"id": "CVE-2020-22253",
"lastModified": "2024-11-21T05:13:13.093",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-04-06T23:15:08.830",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "http://www.xiongmaitech.com/en/index.php/news/info/12/68"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "http://www.xiongmaitech.com/en/index.php/news/info/12/68"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2021-41506 (GCVE-0-2021-41506)
Vulnerability from cvelistv5 – Published: 2022-06-30 12:43 – Updated: 2024-08-04 03:15
VLAI?
Summary
Xiaongmai AHB7008T-MH-V2, AHB7804R-ELS, AHB7804R-MH-V2, AHB7808R-MS-V2, AHB7808R-MS, AHB7808T-MS-V2, AHB7804R-LMS, HI3518_50H10L_S39 V4.02.R11.7601.Nat.Onvif.20170420, V4.02.R11.Nat.Onvif.20160422, V4.02.R11.7601.Nat.Onvif.20170424, V4.02.R11.Nat.Onvif.20170327, V4.02.R11.Nat.Onvif.20161205, V4.02.R11.Nat.20170301, V4.02.R12.Nat.OnvifS.20170727 is affected by a backdoor in the macGuarder and dvrHelper binaries of DVR/NVR/IP camera firmware due to static root account credentials in the system.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T03:15:28.367Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://habr.com/en/post/486856/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.xiongmaitech.com/en/index.php/news/info/12/68"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/Snawoot/hisilicon-dvr-telnet"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/tothi/hs-dvr-telnet"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Xiaongmai AHB7008T-MH-V2, AHB7804R-ELS, AHB7804R-MH-V2, AHB7808R-MS-V2, AHB7808R-MS, AHB7808T-MS-V2, AHB7804R-LMS, HI3518_50H10L_S39 V4.02.R11.7601.Nat.Onvif.20170420, V4.02.R11.Nat.Onvif.20160422, V4.02.R11.7601.Nat.Onvif.20170424, V4.02.R11.Nat.Onvif.20170327, V4.02.R11.Nat.Onvif.20161205, V4.02.R11.Nat.20170301, V4.02.R12.Nat.OnvifS.20170727 is affected by a backdoor in the macGuarder and dvrHelper binaries of DVR/NVR/IP camera firmware due to static root account credentials in the system."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-06-30T12:43:54",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://habr.com/en/post/486856/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.xiongmaitech.com/en/index.php/news/info/12/68"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/Snawoot/hisilicon-dvr-telnet"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/tothi/hs-dvr-telnet"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-41506",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Xiaongmai AHB7008T-MH-V2, AHB7804R-ELS, AHB7804R-MH-V2, AHB7808R-MS-V2, AHB7808R-MS, AHB7808T-MS-V2, AHB7804R-LMS, HI3518_50H10L_S39 V4.02.R11.7601.Nat.Onvif.20170420, V4.02.R11.Nat.Onvif.20160422, V4.02.R11.7601.Nat.Onvif.20170424, V4.02.R11.Nat.Onvif.20170327, V4.02.R11.Nat.Onvif.20161205, V4.02.R11.Nat.20170301, V4.02.R12.Nat.OnvifS.20170727 is affected by a backdoor in the macGuarder and dvrHelper binaries of DVR/NVR/IP camera firmware due to static root account credentials in the system."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://habr.com/en/post/486856/",
"refsource": "MISC",
"url": "https://habr.com/en/post/486856/"
},
{
"name": "https://www.xiongmaitech.com/en/index.php/news/info/12/68",
"refsource": "MISC",
"url": "https://www.xiongmaitech.com/en/index.php/news/info/12/68"
},
{
"name": "https://github.com/Snawoot/hisilicon-dvr-telnet",
"refsource": "MISC",
"url": "https://github.com/Snawoot/hisilicon-dvr-telnet"
},
{
"name": "https://github.com/tothi/hs-dvr-telnet",
"refsource": "MISC",
"url": "https://github.com/tothi/hs-dvr-telnet"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-41506",
"datePublished": "2022-06-30T12:43:54",
"dateReserved": "2021-09-20T00:00:00",
"dateUpdated": "2024-08-04T03:15:28.367Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-22253 (GCVE-0-2020-22253)
Vulnerability from cvelistv5 – Published: 2022-04-06 22:41 – Updated: 2024-08-04 14:51
VLAI?
Summary
Xiongmai Technology Co devices AHB7008T-MH-V2, AHB7804R-ELS, AHB7804R-MH-V2, AHB7808R-MS-V2, AHB7808R-MS, AHB7808T-MS-V2, AHB7804R-LMS, and HI3518E_50H10L_S39 were all discovered to have port 9530 open which allows unauthenticated attackers to make arbitrary Telnet connections with the victim device.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T14:51:10.495Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.xiongmaitech.com/en/index.php/news/info/12/68"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Xiongmai Technology Co devices AHB7008T-MH-V2, AHB7804R-ELS, AHB7804R-MH-V2, AHB7808R-MS-V2, AHB7808R-MS, AHB7808T-MS-V2, AHB7804R-LMS, and HI3518E_50H10L_S39 were all discovered to have port 9530 open which allows unauthenticated attackers to make arbitrary Telnet connections with the victim device."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-04-06T22:41:18",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.xiongmaitech.com/en/index.php/news/info/12/68"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-22253",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Xiongmai Technology Co devices AHB7008T-MH-V2, AHB7804R-ELS, AHB7804R-MH-V2, AHB7808R-MS-V2, AHB7808R-MS, AHB7808T-MS-V2, AHB7804R-LMS, and HI3518E_50H10L_S39 were all discovered to have port 9530 open which allows unauthenticated attackers to make arbitrary Telnet connections with the victim device."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.xiongmaitech.com/en/index.php/news/info/12/68",
"refsource": "MISC",
"url": "http://www.xiongmaitech.com/en/index.php/news/info/12/68"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2020-22253",
"datePublished": "2022-04-06T22:41:18",
"dateReserved": "2020-08-13T00:00:00",
"dateUpdated": "2024-08-04T14:51:10.495Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-41506 (GCVE-0-2021-41506)
Vulnerability from nvd – Published: 2022-06-30 12:43 – Updated: 2024-08-04 03:15
VLAI?
Summary
Xiaongmai AHB7008T-MH-V2, AHB7804R-ELS, AHB7804R-MH-V2, AHB7808R-MS-V2, AHB7808R-MS, AHB7808T-MS-V2, AHB7804R-LMS, HI3518_50H10L_S39 V4.02.R11.7601.Nat.Onvif.20170420, V4.02.R11.Nat.Onvif.20160422, V4.02.R11.7601.Nat.Onvif.20170424, V4.02.R11.Nat.Onvif.20170327, V4.02.R11.Nat.Onvif.20161205, V4.02.R11.Nat.20170301, V4.02.R12.Nat.OnvifS.20170727 is affected by a backdoor in the macGuarder and dvrHelper binaries of DVR/NVR/IP camera firmware due to static root account credentials in the system.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T03:15:28.367Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://habr.com/en/post/486856/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.xiongmaitech.com/en/index.php/news/info/12/68"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/Snawoot/hisilicon-dvr-telnet"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/tothi/hs-dvr-telnet"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Xiaongmai AHB7008T-MH-V2, AHB7804R-ELS, AHB7804R-MH-V2, AHB7808R-MS-V2, AHB7808R-MS, AHB7808T-MS-V2, AHB7804R-LMS, HI3518_50H10L_S39 V4.02.R11.7601.Nat.Onvif.20170420, V4.02.R11.Nat.Onvif.20160422, V4.02.R11.7601.Nat.Onvif.20170424, V4.02.R11.Nat.Onvif.20170327, V4.02.R11.Nat.Onvif.20161205, V4.02.R11.Nat.20170301, V4.02.R12.Nat.OnvifS.20170727 is affected by a backdoor in the macGuarder and dvrHelper binaries of DVR/NVR/IP camera firmware due to static root account credentials in the system."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-06-30T12:43:54",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://habr.com/en/post/486856/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.xiongmaitech.com/en/index.php/news/info/12/68"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/Snawoot/hisilicon-dvr-telnet"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/tothi/hs-dvr-telnet"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-41506",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Xiaongmai AHB7008T-MH-V2, AHB7804R-ELS, AHB7804R-MH-V2, AHB7808R-MS-V2, AHB7808R-MS, AHB7808T-MS-V2, AHB7804R-LMS, HI3518_50H10L_S39 V4.02.R11.7601.Nat.Onvif.20170420, V4.02.R11.Nat.Onvif.20160422, V4.02.R11.7601.Nat.Onvif.20170424, V4.02.R11.Nat.Onvif.20170327, V4.02.R11.Nat.Onvif.20161205, V4.02.R11.Nat.20170301, V4.02.R12.Nat.OnvifS.20170727 is affected by a backdoor in the macGuarder and dvrHelper binaries of DVR/NVR/IP camera firmware due to static root account credentials in the system."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://habr.com/en/post/486856/",
"refsource": "MISC",
"url": "https://habr.com/en/post/486856/"
},
{
"name": "https://www.xiongmaitech.com/en/index.php/news/info/12/68",
"refsource": "MISC",
"url": "https://www.xiongmaitech.com/en/index.php/news/info/12/68"
},
{
"name": "https://github.com/Snawoot/hisilicon-dvr-telnet",
"refsource": "MISC",
"url": "https://github.com/Snawoot/hisilicon-dvr-telnet"
},
{
"name": "https://github.com/tothi/hs-dvr-telnet",
"refsource": "MISC",
"url": "https://github.com/tothi/hs-dvr-telnet"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-41506",
"datePublished": "2022-06-30T12:43:54",
"dateReserved": "2021-09-20T00:00:00",
"dateUpdated": "2024-08-04T03:15:28.367Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-22253 (GCVE-0-2020-22253)
Vulnerability from nvd – Published: 2022-04-06 22:41 – Updated: 2024-08-04 14:51
VLAI?
Summary
Xiongmai Technology Co devices AHB7008T-MH-V2, AHB7804R-ELS, AHB7804R-MH-V2, AHB7808R-MS-V2, AHB7808R-MS, AHB7808T-MS-V2, AHB7804R-LMS, and HI3518E_50H10L_S39 were all discovered to have port 9530 open which allows unauthenticated attackers to make arbitrary Telnet connections with the victim device.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T14:51:10.495Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.xiongmaitech.com/en/index.php/news/info/12/68"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Xiongmai Technology Co devices AHB7008T-MH-V2, AHB7804R-ELS, AHB7804R-MH-V2, AHB7808R-MS-V2, AHB7808R-MS, AHB7808T-MS-V2, AHB7804R-LMS, and HI3518E_50H10L_S39 were all discovered to have port 9530 open which allows unauthenticated attackers to make arbitrary Telnet connections with the victim device."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-04-06T22:41:18",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.xiongmaitech.com/en/index.php/news/info/12/68"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-22253",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Xiongmai Technology Co devices AHB7008T-MH-V2, AHB7804R-ELS, AHB7804R-MH-V2, AHB7808R-MS-V2, AHB7808R-MS, AHB7808T-MS-V2, AHB7804R-LMS, and HI3518E_50H10L_S39 were all discovered to have port 9530 open which allows unauthenticated attackers to make arbitrary Telnet connections with the victim device."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.xiongmaitech.com/en/index.php/news/info/12/68",
"refsource": "MISC",
"url": "http://www.xiongmaitech.com/en/index.php/news/info/12/68"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2020-22253",
"datePublished": "2022-04-06T22:41:18",
"dateReserved": "2020-08-13T00:00:00",
"dateUpdated": "2024-08-04T14:51:10.495Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}