Search criteria

6 vulnerabilities found for geovision_gv-as410_firmware by usavisionsys

FKIE_CVE-2020-3929

Vulnerability from fkie_nvd - Published: 2020-06-12 09:15 - Updated: 2024-11-21 05:31
Summary
GeoVision Door Access Control device family employs shared cryptographic private keys for SSH and HTTPS. Attackers may conduct MITM attack with the derived keys and plaintext recover of encrypted messages.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:usavisionsys:geovision_gv-as210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2480CC4C-F807-45F1-81EA-B285AF76F4B5",
              "versionEndExcluding": "2.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:usavisionsys:geovision_gv-as210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "769CD421-6EAB-405A-AE7B-9792A0AA6505",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:usavisionsys:geovision_gv-as410_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE2ED4E6-EF78-4316-BC93-DA9612353C05",
              "versionEndExcluding": "2.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:usavisionsys:geovision_gv-as410:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B1FD8AD-82E4-43E7-87BE-5EBD5FC3F7FC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:usavisionsys:geovision_gv-as810_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C6FDC61-7A54-465D-86D1-D6A77A06DF41",
              "versionEndExcluding": "2.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:usavisionsys:geovision_gv-as810:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBF997D8-2BD1-4D02-94E3-AC127F5793DE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:usavisionsys:geovision_gv-as1010_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "55ED99A6-AB97-4FBA-884C-2C341AD61DDF",
              "versionEndExcluding": "1.32",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:usavisionsys:geovision_gv-as1010:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86F92B38-DE28-4D9F-B3C4-A7E383619E24",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:usavisionsys:geovision_gv-gf192x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED3D5C9C-C65D-4E3B-B4E9-BA6A4AAA8256",
              "versionEndExcluding": "1.10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:usavisionsys:geovision_gv-gf192x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A6C15EC-B6F9-4EE1-89D0-3B2D1A8DB803",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "GeoVision Door Access Control device family employs shared cryptographic private keys for SSH and HTTPS. Attackers may conduct MITM attack with the derived keys and plaintext recover of encrypted messages."
    },
    {
      "lang": "es",
      "value": "La familia de dispositivos GeoVision Door Access Control emplea claves privadas criptogr\u00e1ficas compartidas para SSH y HTTPS. Los atacantes pueden conducir ataques MITM con las claves derivadas y recuperan texto plano de mensajes cifrados"
    }
  ],
  "id": "CVE-2020-3929",
  "lastModified": "2024-11-21T05:31:58.740",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 3.6,
        "source": "twcert@cert.org.tw",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-06-12T09:15:10.380",
  "references": [
    {
      "source": "twcert@cert.org.tw",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.twcert.org.tw/tw/cp-132-3696-6601c-1.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.twcert.org.tw/tw/cp-132-3696-6601c-1.html"
    }
  ],
  "sourceIdentifier": "twcert@cert.org.tw",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-326"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2020-3928

Vulnerability from fkie_nvd - Published: 2020-06-12 09:15 - Updated: 2024-11-21 05:31

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:usavisionsys:geovision_gv-as210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2480CC4C-F807-45F1-81EA-B285AF76F4B5",
              "versionEndExcluding": "2.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:usavisionsys:geovision_gv-as210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "769CD421-6EAB-405A-AE7B-9792A0AA6505",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:usavisionsys:geovision_gv-as410_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE2ED4E6-EF78-4316-BC93-DA9612353C05",
              "versionEndExcluding": "2.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:usavisionsys:geovision_gv-as410:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B1FD8AD-82E4-43E7-87BE-5EBD5FC3F7FC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:usavisionsys:geovision_gv-as810_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C6FDC61-7A54-465D-86D1-D6A77A06DF41",
              "versionEndExcluding": "2.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:usavisionsys:geovision_gv-as810:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBF997D8-2BD1-4D02-94E3-AC127F5793DE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:usavisionsys:geovision_gv-as1010_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "55ED99A6-AB97-4FBA-884C-2C341AD61DDF",
              "versionEndExcluding": "1.32",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:usavisionsys:geovision_gv-as1010:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86F92B38-DE28-4D9F-B3C4-A7E383619E24",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:usavisionsys:geovision_gv-gf192x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED3D5C9C-C65D-4E3B-B4E9-BA6A4AAA8256",
              "versionEndExcluding": "1.10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:usavisionsys:geovision_gv-gf192x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A6C15EC-B6F9-4EE1-89D0-3B2D1A8DB803",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "GeoVision Door Access Control device family is hardcoded with a root password, which adopting an identical password in all devices."
    },
    {
      "lang": "es",
      "value": "La familia de dispositivos GeoVision Door Access Control es embebida con una contrase\u00f1a root, que adopta una contrase\u00f1a id\u00e9ntica en todos los dispositivos"
    }
  ],
  "id": "CVE-2020-3928",
  "lastModified": "2024-11-21T05:31:58.607",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 6.2,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.5,
        "impactScore": 3.6,
        "source": "twcert@cert.org.tw",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-06-12T09:15:10.287",
  "references": [
    {
      "source": "twcert@cert.org.tw",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.twcert.org.tw/tw/cp-132-3695-9e72d-1.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.twcert.org.tw/tw/cp-132-3695-9e72d-1.html"
    }
  ],
  "sourceIdentifier": "twcert@cert.org.tw",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-798"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2020-3928 (GCVE-0-2020-3928)

Vulnerability from cvelistv5 – Published: 2020-06-12 08:25 – Updated: 2024-09-17 01:21
VLAI?
Title
GeoVision Door Access Control Device - Hardcoded privileged password
Summary
GeoVision Door Access Control device family is hardcoded with a root password, which adopting an identical password in all devices.
CWE
  • Hardcoded privileged password
Assigner
References
Impacted products
Vendor Product Version
GeoVision Door Access Control Device Affected: GV-AS210 , ≤ 2.21 (custom)
Affected: GV-AS410 , ≤ 2.21 (custom)
Affected: GV-AS810 , ≤ 2.21 (custom)
Affected: GV-GF192x , ≤ 1.10 (custom)
Affected: GV-AS1010 , ≤ 1.32 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T07:52:19.776Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.twcert.org.tw/tw/cp-132-3695-9e72d-1.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Door Access Control Device",
          "vendor": "GeoVision",
          "versions": [
            {
              "lessThanOrEqual": "2.21",
              "status": "affected",
              "version": "GV-AS210",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "2.21",
              "status": "affected",
              "version": "GV-AS410",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "2.21",
              "status": "affected",
              "version": "GV-AS810",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "1.10",
              "status": "affected",
              "version": "GV-GF192x",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "1.32",
              "status": "affected",
              "version": "GV-AS1010",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2020-06-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "GeoVision Door Access Control device family is hardcoded with a root password, which adopting an identical password in all devices."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Hardcoded privileged password",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-06-12T08:25:22",
        "orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e",
        "shortName": "twcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.twcert.org.tw/tw/cp-132-3695-9e72d-1.html"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Update to version 2.22 in GV-AS210\nUpdate to version 2.22 in GV-AS410\nUpdate to version 2.22 in GV-AS810\nUpdate to version 1.22 in GV-GF192x\nUpdate to version 1.33 in GV-AS1010"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "GeoVision Door Access Control Device - Hardcoded privileged password",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "AKA": "TWCERT/CC",
          "ASSIGNER": "cve@cert.org.tw",
          "DATE_PUBLIC": "2020-06-12T08:00:00.000Z",
          "ID": "CVE-2020-3928",
          "STATE": "PUBLIC",
          "TITLE": "GeoVision Door Access Control Device - Hardcoded privileged password"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Door Access Control Device",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "GV-AS210",
                            "version_value": "2.21"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_name": "GV-AS410",
                            "version_value": "2.21"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_name": "GV-AS810",
                            "version_value": "2.21"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_name": "GV-GF192x",
                            "version_value": "1.10"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_name": "GV-AS1010",
                            "version_value": "1.32"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "GeoVision"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "GeoVision Door Access Control device family is hardcoded with a root password, which adopting an identical password in all devices."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Hardcoded privileged password"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.twcert.org.tw/tw/cp-132-3695-9e72d-1.html",
              "refsource": "MISC",
              "url": "https://www.twcert.org.tw/tw/cp-132-3695-9e72d-1.html"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "Update to version 2.22 in GV-AS210\nUpdate to version 2.22 in GV-AS410\nUpdate to version 2.22 in GV-AS810\nUpdate to version 1.22 in GV-GF192x\nUpdate to version 1.33 in GV-AS1010"
          }
        ],
        "source": {
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e",
    "assignerShortName": "twcert",
    "cveId": "CVE-2020-3928",
    "datePublished": "2020-06-12T08:25:23.055079Z",
    "dateReserved": "2019-12-20T00:00:00",
    "dateUpdated": "2024-09-17T01:21:32.177Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-3929 (GCVE-0-2020-3929)

Vulnerability from cvelistv5 – Published: 2020-06-12 08:25 – Updated: 2024-09-17 02:26
VLAI?
Title
GeoVision Door Access Control Device - Shared cryptographic keys
Summary
GeoVision Door Access Control device family employs shared cryptographic private keys for SSH and HTTPS. Attackers may conduct MITM attack with the derived keys and plaintext recover of encrypted messages.
CWE
  • Shared cryptographic keys
Assigner
References
Impacted products
Vendor Product Version
GeoVision Door Access Control Device Affected: GV-AS210 , ≤ 2.21 (custom)
Affected: GV-AS410 , ≤ 2.21 (custom)
Affected: GV-AS810 , ≤ 2.21 (custom)
Affected: GV-GF192x , ≤ 1.10 (custom)
Affected: GV-AS1010 , ≤ 1.32 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T07:52:19.823Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.twcert.org.tw/tw/cp-132-3696-6601c-1.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Door Access Control Device",
          "vendor": "GeoVision",
          "versions": [
            {
              "lessThanOrEqual": "2.21",
              "status": "affected",
              "version": "GV-AS210",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "2.21",
              "status": "affected",
              "version": "GV-AS410",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "2.21",
              "status": "affected",
              "version": "GV-AS810",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "1.10",
              "status": "affected",
              "version": "GV-GF192x",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "1.32",
              "status": "affected",
              "version": "GV-AS1010",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2020-06-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "GeoVision Door Access Control device family employs shared cryptographic private keys for SSH and HTTPS. Attackers may conduct MITM attack with the derived keys and plaintext recover of encrypted messages."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Shared cryptographic keys",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-06-12T08:25:23",
        "orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e",
        "shortName": "twcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.twcert.org.tw/tw/cp-132-3696-6601c-1.html"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Update to version 2.22 in GV-AS210\nUpdate to version 2.22 in GV-AS410\nUpdate to version 2.22 in GV-AS810\nUpdate to version 1.22 in GV-GF192x\nUpdate to version 1.33 in GV-AS1010"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "GeoVision Door Access Control Device - Shared cryptographic keys",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "AKA": "TWCERT/CC",
          "ASSIGNER": "cve@cert.org.tw",
          "DATE_PUBLIC": "2020-06-12T08:00:00.000Z",
          "ID": "CVE-2020-3929",
          "STATE": "PUBLIC",
          "TITLE": "GeoVision Door Access Control Device - Shared cryptographic keys"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Door Access Control Device",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "GV-AS210",
                            "version_value": "2.21"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_name": "GV-AS410",
                            "version_value": "2.21"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_name": "GV-AS810",
                            "version_value": "2.21"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_name": "GV-GF192x",
                            "version_value": "1.10"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_name": "GV-AS1010",
                            "version_value": "1.32"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "GeoVision"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "GeoVision Door Access Control device family employs shared cryptographic private keys for SSH and HTTPS. Attackers may conduct MITM attack with the derived keys and plaintext recover of encrypted messages."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Shared cryptographic keys"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.twcert.org.tw/tw/cp-132-3696-6601c-1.html",
              "refsource": "MISC",
              "url": "https://www.twcert.org.tw/tw/cp-132-3696-6601c-1.html"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "Update to version 2.22 in GV-AS210\nUpdate to version 2.22 in GV-AS410\nUpdate to version 2.22 in GV-AS810\nUpdate to version 1.22 in GV-GF192x\nUpdate to version 1.33 in GV-AS1010"
          }
        ],
        "source": {
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e",
    "assignerShortName": "twcert",
    "cveId": "CVE-2020-3929",
    "datePublished": "2020-06-12T08:25:23.476254Z",
    "dateReserved": "2019-12-20T00:00:00",
    "dateUpdated": "2024-09-17T02:26:42.600Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-3928 (GCVE-0-2020-3928)

Vulnerability from nvd – Published: 2020-06-12 08:25 – Updated: 2024-09-17 01:21
VLAI?
Title
GeoVision Door Access Control Device - Hardcoded privileged password
Summary
GeoVision Door Access Control device family is hardcoded with a root password, which adopting an identical password in all devices.
CWE
  • Hardcoded privileged password
Assigner
References
Impacted products
Vendor Product Version
GeoVision Door Access Control Device Affected: GV-AS210 , ≤ 2.21 (custom)
Affected: GV-AS410 , ≤ 2.21 (custom)
Affected: GV-AS810 , ≤ 2.21 (custom)
Affected: GV-GF192x , ≤ 1.10 (custom)
Affected: GV-AS1010 , ≤ 1.32 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T07:52:19.776Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.twcert.org.tw/tw/cp-132-3695-9e72d-1.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Door Access Control Device",
          "vendor": "GeoVision",
          "versions": [
            {
              "lessThanOrEqual": "2.21",
              "status": "affected",
              "version": "GV-AS210",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "2.21",
              "status": "affected",
              "version": "GV-AS410",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "2.21",
              "status": "affected",
              "version": "GV-AS810",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "1.10",
              "status": "affected",
              "version": "GV-GF192x",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "1.32",
              "status": "affected",
              "version": "GV-AS1010",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2020-06-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "GeoVision Door Access Control device family is hardcoded with a root password, which adopting an identical password in all devices."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Hardcoded privileged password",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-06-12T08:25:22",
        "orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e",
        "shortName": "twcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.twcert.org.tw/tw/cp-132-3695-9e72d-1.html"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Update to version 2.22 in GV-AS210\nUpdate to version 2.22 in GV-AS410\nUpdate to version 2.22 in GV-AS810\nUpdate to version 1.22 in GV-GF192x\nUpdate to version 1.33 in GV-AS1010"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "GeoVision Door Access Control Device - Hardcoded privileged password",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "AKA": "TWCERT/CC",
          "ASSIGNER": "cve@cert.org.tw",
          "DATE_PUBLIC": "2020-06-12T08:00:00.000Z",
          "ID": "CVE-2020-3928",
          "STATE": "PUBLIC",
          "TITLE": "GeoVision Door Access Control Device - Hardcoded privileged password"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Door Access Control Device",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "GV-AS210",
                            "version_value": "2.21"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_name": "GV-AS410",
                            "version_value": "2.21"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_name": "GV-AS810",
                            "version_value": "2.21"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_name": "GV-GF192x",
                            "version_value": "1.10"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_name": "GV-AS1010",
                            "version_value": "1.32"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "GeoVision"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "GeoVision Door Access Control device family is hardcoded with a root password, which adopting an identical password in all devices."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Hardcoded privileged password"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.twcert.org.tw/tw/cp-132-3695-9e72d-1.html",
              "refsource": "MISC",
              "url": "https://www.twcert.org.tw/tw/cp-132-3695-9e72d-1.html"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "Update to version 2.22 in GV-AS210\nUpdate to version 2.22 in GV-AS410\nUpdate to version 2.22 in GV-AS810\nUpdate to version 1.22 in GV-GF192x\nUpdate to version 1.33 in GV-AS1010"
          }
        ],
        "source": {
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e",
    "assignerShortName": "twcert",
    "cveId": "CVE-2020-3928",
    "datePublished": "2020-06-12T08:25:23.055079Z",
    "dateReserved": "2019-12-20T00:00:00",
    "dateUpdated": "2024-09-17T01:21:32.177Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-3929 (GCVE-0-2020-3929)

Vulnerability from nvd – Published: 2020-06-12 08:25 – Updated: 2024-09-17 02:26
VLAI?
Title
GeoVision Door Access Control Device - Shared cryptographic keys
Summary
GeoVision Door Access Control device family employs shared cryptographic private keys for SSH and HTTPS. Attackers may conduct MITM attack with the derived keys and plaintext recover of encrypted messages.
CWE
  • Shared cryptographic keys
Assigner
References
Impacted products
Vendor Product Version
GeoVision Door Access Control Device Affected: GV-AS210 , ≤ 2.21 (custom)
Affected: GV-AS410 , ≤ 2.21 (custom)
Affected: GV-AS810 , ≤ 2.21 (custom)
Affected: GV-GF192x , ≤ 1.10 (custom)
Affected: GV-AS1010 , ≤ 1.32 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T07:52:19.823Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.twcert.org.tw/tw/cp-132-3696-6601c-1.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Door Access Control Device",
          "vendor": "GeoVision",
          "versions": [
            {
              "lessThanOrEqual": "2.21",
              "status": "affected",
              "version": "GV-AS210",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "2.21",
              "status": "affected",
              "version": "GV-AS410",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "2.21",
              "status": "affected",
              "version": "GV-AS810",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "1.10",
              "status": "affected",
              "version": "GV-GF192x",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "1.32",
              "status": "affected",
              "version": "GV-AS1010",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2020-06-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "GeoVision Door Access Control device family employs shared cryptographic private keys for SSH and HTTPS. Attackers may conduct MITM attack with the derived keys and plaintext recover of encrypted messages."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Shared cryptographic keys",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-06-12T08:25:23",
        "orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e",
        "shortName": "twcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.twcert.org.tw/tw/cp-132-3696-6601c-1.html"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Update to version 2.22 in GV-AS210\nUpdate to version 2.22 in GV-AS410\nUpdate to version 2.22 in GV-AS810\nUpdate to version 1.22 in GV-GF192x\nUpdate to version 1.33 in GV-AS1010"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "GeoVision Door Access Control Device - Shared cryptographic keys",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "AKA": "TWCERT/CC",
          "ASSIGNER": "cve@cert.org.tw",
          "DATE_PUBLIC": "2020-06-12T08:00:00.000Z",
          "ID": "CVE-2020-3929",
          "STATE": "PUBLIC",
          "TITLE": "GeoVision Door Access Control Device - Shared cryptographic keys"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Door Access Control Device",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "GV-AS210",
                            "version_value": "2.21"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_name": "GV-AS410",
                            "version_value": "2.21"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_name": "GV-AS810",
                            "version_value": "2.21"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_name": "GV-GF192x",
                            "version_value": "1.10"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_name": "GV-AS1010",
                            "version_value": "1.32"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "GeoVision"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "GeoVision Door Access Control device family employs shared cryptographic private keys for SSH and HTTPS. Attackers may conduct MITM attack with the derived keys and plaintext recover of encrypted messages."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Shared cryptographic keys"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.twcert.org.tw/tw/cp-132-3696-6601c-1.html",
              "refsource": "MISC",
              "url": "https://www.twcert.org.tw/tw/cp-132-3696-6601c-1.html"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "Update to version 2.22 in GV-AS210\nUpdate to version 2.22 in GV-AS410\nUpdate to version 2.22 in GV-AS810\nUpdate to version 1.22 in GV-GF192x\nUpdate to version 1.33 in GV-AS1010"
          }
        ],
        "source": {
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e",
    "assignerShortName": "twcert",
    "cveId": "CVE-2020-3929",
    "datePublished": "2020-06-12T08:25:23.476254Z",
    "dateReserved": "2019-12-20T00:00:00",
    "dateUpdated": "2024-09-17T02:26:42.600Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}