Vulnerabilites related to dahuasecurity - ipc-hx2xxx
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:sd6al_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1CE773D-CA5F-483C-B20C-DAD30A590DDD", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:sd6al:-:*:*:*:*:*:*:*", "matchCriteriaId": "C35F4371-334B-4EA8-8F48-498C81652F7C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:sd5a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "083AE420-CAF9-4A2A-8C76-79DD590FA191", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:sd5a:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EE24474-EF35-4475-99DD-4B54D6AF0B2D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:sd1a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A075994-60D1-40B7-9EF6-8048CBC18764", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:sd1a:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A3C5893-E1D0-4E06-9F7F-058B657E4493", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ptz1a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F78D2E9E-9909-4130-A146-CA861F7DF341", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ptz1a:-:*:*:*:*:*:*:*", "matchCriteriaId": "19B57B9D-0729-48E0-892B-E39AE1F89AB4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:sd50_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "18CD222C-C95A-4D5E-A763-5D2F74EAEC04", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:sd50:-:*:*:*:*:*:*:*", "matchCriteriaId": "984AD4D5-D689-4150-A1EE-D48B81CBB7C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:sd52c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0ECBC0BF-171E-49FD-B6AF-CC7B29D39FB7", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:sd52c:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BA0D206-5BE7-4592-8D3E-641F47164770", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hx5842h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E8CB654-0526-4E7A-8984-8350B39BB4DF", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hx5842h:-:*:*:*:*:*:*:*", "matchCriteriaId": "724F4B7D-C8C1-4914-B1D6-B4CB9B1F4093", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hx7842h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AEBFC1D-9F25-4FDB-A191-D7D6C1C6E234", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hx7842h:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D6E27D8-C608-49E7-8284-5196EDB428DB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hx2xxx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A046C7EA-F954-4F36-9ED3-DBA84F1FB2D3", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hx2xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B8887C8-C335-4EBB-BC7F-D4F8D8205DAE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hxxx5x4x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCD8DCD2-5CEA-420F-860C-11B469D9FF8F", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hxxx5x4x:-:*:*:*:*:*:*:*", "matchCriteriaId": "F051A1A0-E841-42E7-92A3-E45E4017DCDE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n42b1p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F092AA97-7184-4499-BB83-D6204BD4621B", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n42b1p:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCB3A7FD-63A2-423C-912F-E2E5B4690CF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n42b2p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "855B3C5F-CE9D-4FFA-B485-11A8D675F006", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n42b2p:-:*:*:*:*:*:*:*", "matchCriteriaId": "83B0FAFA-BEF4-4196-A4BC-4CFD6DCF4986", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n42b3p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D0E03DE-1BFA-43AD-9AC6-72A1A1545D4B", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n42b3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B51E9FED-4929-42CC-AA6F-BFF61E8F88C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n52a4p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F20B6467-53DC-4DC6-BCC2-6B6B33ABD65D", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n52a4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB41CE1D-1A97-4549-A849-D06F78858CA3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n54a4p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFA91720-5AE4-48B6-A940-A4DBE650591D", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahua:n54a4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "D871578A-E282-4AEE-8B7E-5F52011FA9CA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n52b2p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ACD4FD87-1D74-4895-AA89-D26541A55433", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n52b2p:-:*:*:*:*:*:*:*", "matchCriteriaId": "7936F0A3-F6DF-47B2-898E-DBE68B369633", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n52b5p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D5136C6-2355-4782-BF9C-0874DC5B0CDA", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n52b5p:-:*:*:*:*:*:*:*", "matchCriteriaId": "195D7533-B2EF-4BC2-B6D6-0B141FB90090", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n52b3p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7180D6E1-6F7F-4EAD-BD51-02C029EFB034", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n52b3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "03D1AD58-447D-4D30-B9CF-48B5CB743C2B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n54b2p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEC0287A-824B-46D0-84AB-54BEEF90E16B", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n54b2p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5667962D-1A47-4D77-95A4-6B34F8863761", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Some Dahua products have buffer overflow vulnerabilities. After the successful login of the legal account, the attacker sends a specific DDNS test command, which may cause the device to go down." }, { "lang": "es", "value": "Algunos productos Dahua presentan vulnerabilidades de desbordamiento de b\u00fafer. Despu\u00e9s del inicio de sesi\u00f3n con \u00e9xito de la cuenta legal, el atacante env\u00eda un comando de prueba DDNS espec\u00edfico, que puede hacer que el dispositivo se caiga." } ], "id": "CVE-2020-9499", "lastModified": "2024-11-21T05:40:46.800", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-09T14:15:13.213", "references": [ { "source": "cybersecurity@dahuatech.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dahuasecurity.com/support/cybersecurity/details/727" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.dahuasecurity.com/support/cybersecurity/details/727" } ], "sourceIdentifier": "cybersecurity@dahuatech.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:sd6al_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1CE773D-CA5F-483C-B20C-DAD30A590DDD", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:sd6al:-:*:*:*:*:*:*:*", "matchCriteriaId": "C35F4371-334B-4EA8-8F48-498C81652F7C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:sd5a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "083AE420-CAF9-4A2A-8C76-79DD590FA191", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:sd5a:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EE24474-EF35-4475-99DD-4B54D6AF0B2D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:sd1a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A075994-60D1-40B7-9EF6-8048CBC18764", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:sd1a:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A3C5893-E1D0-4E06-9F7F-058B657E4493", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ptz1a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F78D2E9E-9909-4130-A146-CA861F7DF341", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ptz1a:-:*:*:*:*:*:*:*", "matchCriteriaId": "19B57B9D-0729-48E0-892B-E39AE1F89AB4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:sd50_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "18CD222C-C95A-4D5E-A763-5D2F74EAEC04", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:sd50:-:*:*:*:*:*:*:*", "matchCriteriaId": "984AD4D5-D689-4150-A1EE-D48B81CBB7C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:sd52c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0ECBC0BF-171E-49FD-B6AF-CC7B29D39FB7", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:sd52c:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BA0D206-5BE7-4592-8D3E-641F47164770", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hx5842h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E8CB654-0526-4E7A-8984-8350B39BB4DF", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hx5842h:-:*:*:*:*:*:*:*", "matchCriteriaId": "724F4B7D-C8C1-4914-B1D6-B4CB9B1F4093", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hx7842h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AEBFC1D-9F25-4FDB-A191-D7D6C1C6E234", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hx7842h:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D6E27D8-C608-49E7-8284-5196EDB428DB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hx2xxx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A046C7EA-F954-4F36-9ED3-DBA84F1FB2D3", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hx2xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B8887C8-C335-4EBB-BC7F-D4F8D8205DAE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hxxx5x4x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCD8DCD2-5CEA-420F-860C-11B469D9FF8F", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hxxx5x4x:-:*:*:*:*:*:*:*", "matchCriteriaId": "F051A1A0-E841-42E7-92A3-E45E4017DCDE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n42b1p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F092AA97-7184-4499-BB83-D6204BD4621B", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n42b1p:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCB3A7FD-63A2-423C-912F-E2E5B4690CF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n42b2p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "855B3C5F-CE9D-4FFA-B485-11A8D675F006", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n42b2p:-:*:*:*:*:*:*:*", "matchCriteriaId": "83B0FAFA-BEF4-4196-A4BC-4CFD6DCF4986", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n42b3p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D0E03DE-1BFA-43AD-9AC6-72A1A1545D4B", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n42b3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B51E9FED-4929-42CC-AA6F-BFF61E8F88C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n52a4p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F20B6467-53DC-4DC6-BCC2-6B6B33ABD65D", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n52a4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB41CE1D-1A97-4549-A849-D06F78858CA3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n54a4p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFA91720-5AE4-48B6-A940-A4DBE650591D", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahua:n54a4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "D871578A-E282-4AEE-8B7E-5F52011FA9CA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n52b2p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ACD4FD87-1D74-4895-AA89-D26541A55433", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n52b2p:-:*:*:*:*:*:*:*", "matchCriteriaId": "7936F0A3-F6DF-47B2-898E-DBE68B369633", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n52b5p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D5136C6-2355-4782-BF9C-0874DC5B0CDA", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n52b5p:-:*:*:*:*:*:*:*", "matchCriteriaId": "195D7533-B2EF-4BC2-B6D6-0B141FB90090", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n52b3p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7180D6E1-6F7F-4EAD-BD51-02C029EFB034", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n52b3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "03D1AD58-447D-4D30-B9CF-48B5CB743C2B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n54b2p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEC0287A-824B-46D0-84AB-54BEEF90E16B", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n54b2p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5667962D-1A47-4D77-95A4-6B34F8863761", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Some products of Dahua have Denial of Service vulnerabilities. After the successful login of the legal account, the attacker sends a specific log query command, which may cause the device to go down." }, { "lang": "es", "value": "Algunos productos de Dahua presentan vulnerabilidades de denegaci\u00f3n de servicio. Despu\u00e9s del inicio de sesi\u00f3n con \u00e9xito de la cuenta legal, el atacante env\u00eda un comando de consulta de registro espec\u00edfico, lo que puede causar que el dispositivo se caiga." } ], "id": "CVE-2020-9500", "lastModified": "2024-11-21T05:40:46.927", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-09T14:15:13.260", "references": [ { "source": "cybersecurity@dahuatech.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dahuasecurity.com/support/cybersecurity/details/727" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.dahuasecurity.com/support/cybersecurity/details/727" } ], "sourceIdentifier": "cybersecurity@dahuatech.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hx1xxx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2BB15A66-CCC4-4CA8-AF25-D8D9A81BE796", "versionEndIncluding": "2021-7", "versionStartIncluding": "2017-7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hx1xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC27C4B9-35AA-4CD1-8E30-97D79CA76B30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hx2xxx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB50E813-E761-4575-B670-4C7F812952CB", "versionEndIncluding": "2021-7", "versionStartIncluding": "2017-7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hx2xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B8887C8-C335-4EBB-BC7F-D4F8D8205DAE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hx3xxx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4EC72741-163E-4659-B3F4-D161925F3DE6", "versionEndIncluding": "2021-7", "versionStartIncluding": "2017-7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hx3xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "8936A118-4AB5-4B09-A9FD-E624A68315BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hx5\\(4\\)\\(3\\)xxx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "40C35319-8C5A-461C-AB41-989B63EF19CB", "versionEndIncluding": "2021-7", "versionStartIncluding": "2017-7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hx5\\(4\\)\\(3\\)xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F079822C-4C64-41E3-9A17-F9A56D5B5E91", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hx5xxx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9AA70CB5-B4C0-48D3-ACE8-FF846083BB70", "versionEndIncluding": "2021-7", "versionStartIncluding": "2017-7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hx5xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2838BDA-97FF-498E-BC81-955D31B9227A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:sd1a1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4C3A6AD-19F7-4325-89B4-944B8393C739", "versionEndIncluding": "2021-7", "versionStartIncluding": "2017-7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:sd1a1:-:*:*:*:*:*:*:*", "matchCriteriaId": "88AD58DE-D990-4C98-853B-21B79CD07EEC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:sd22_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0ECB8CCE-F925-437B-8B6E-4690B92D4F80", "versionEndIncluding": "2021-7", "versionStartIncluding": "2017-7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:sd22:-:*:*:*:*:*:*:*", "matchCriteriaId": "428852DE-BDE3-4CE4-972C-821E88C7F930", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:sd49_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "31D5F604-135F-4F17-8093-EE8AEA0408AF", "versionEndIncluding": "2021-7", "versionStartIncluding": "2017-7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:sd49:-:*:*:*:*:*:*:*", "matchCriteriaId": "627C0AE8-01B2-4807-8284-EFE6140598B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:sd50_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8EBB0CC4-4B58-46A4-83FC-11744B2A145B", "versionEndIncluding": "2021-7", "versionStartIncluding": "2017-7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:sd50:-:*:*:*:*:*:*:*", "matchCriteriaId": "984AD4D5-D689-4150-A1EE-D48B81CBB7C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:sd52c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DFAF598-BDBD-4351-A72A-136F606AD8D5", "versionEndIncluding": "2021-7", "versionStartIncluding": "2017-7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:sd52c:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BA0D206-5BE7-4592-8D3E-641F47164770", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:sd6al_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F61D99F5-DE6B-445F-93B6-ECC2DFC41122", "versionEndIncluding": "2021-7", "versionStartIncluding": "2017-7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:sd6al:-:*:*:*:*:*:*:*", "matchCriteriaId": "C35F4371-334B-4EA8-8F48-498C81652F7C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:tpc-bf1241_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC6412DA-4BC4-4326-91DF-7F26572CEFA4", "versionEndIncluding": "2021-7", "versionStartIncluding": "2017-7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:tpc-bf1241:-:*:*:*:*:*:*:*", "matchCriteriaId": "73B58CBF-EB67-4F02-BBAE-FFC329B8873C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:tpc-bf2221_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7D5E183-2F9C-4B81-AC1E-B7C3420594C2", "versionEndIncluding": "2021-7", "versionStartIncluding": "2017-7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:tpc-bf2221:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E314BF6-76B4-4ADB-B555-7DAF92F60485", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:tpc-bf5x01_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D95CC99-5249-4F67-B318-11F68CD42BBA", "versionEndIncluding": "2021-7", "versionStartIncluding": "2017-7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:tpc-bf5x01:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7EA0704-EC7A-457A-9AC1-A39B07229DFE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:tpc-pt8x21x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A231CFA-4CBB-4B0B-AC9D-3BAAA1B0A78B", "versionEndIncluding": "2021-7", "versionStartIncluding": "2017-7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:tpc-pt8x21x:-:*:*:*:*:*:*:*", "matchCriteriaId": "296AE38D-36C0-430F-BFB2-9FB2B5087C83", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:tpc-sd2221_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63FB807B-14F6-4D09-BF06-039BDD7C6F19", "versionEndIncluding": "2021-7", "versionStartIncluding": "2017-7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:tpc-sd2221:-:*:*:*:*:*:*:*", "matchCriteriaId": "D166CD0E-92CC-44FA-A520-FFFEBE2D7D50", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:tpc-sd8x21_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A29734EC-0A1D-40F4-9A77-59D64A552975", "versionEndIncluding": "2021-7", "versionStartIncluding": "2017-7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:tpc-sd8x21:-:*:*:*:*:*:*:*", "matchCriteriaId": "75A88A53-91D8-4019-95EB-F6FEFF469F9A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:nvr1xxx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DA1B61BC-4D6E-4AFA-8F43-CEB88E8084FB", "versionEndIncluding": "2021-7", "versionStartIncluding": "2017-7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:nvr1xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E209BDB-4D44-4ABB-A5EC-0EC46C6EFE48", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:nvr2xxx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84EA30CA-F1CD-4FC6-A2DC-5DED62E85583", "versionEndIncluding": "2021-7", "versionStartIncluding": "2017-7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:nvr2xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B0F1A0B-4C7A-4763-BACC-A4D277F7DA6A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:nvr4xxx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E87CB4D6-9237-4D20-B494-DEABA7836BC6", "versionEndIncluding": "2021-7", "versionStartIncluding": "2017-7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:nvr4xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "994D8768-F93B-4AE0-A2DD-11A24C14882E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:nvr5xxx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C19D24F8-1FF6-4B80-B9A6-6C6E0174EC71", "versionEndIncluding": "2021-7", "versionStartIncluding": "2017-7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:nvr5xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA773F1A-D8CB-4B86-AEF6-7EBFC8A638B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:xvr4xxx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E215F5B8-A229-4EC1-B029-05DE9B14CA55", "versionEndIncluding": "2021-7", "versionStartIncluding": "2017-7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:xvr4xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "21BCC22E-3CBD-48E9-A92F-B1478B12D047", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:xvr5xxx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E3564DD5-7C1B-4DF2-BB44-B9A58BBA7E4A", "versionEndIncluding": "2021-7", "versionStartIncluding": "2017-7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:xvr5xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "84B3EDC6-6D9F-4B3D-A155-CD82D330CC3F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:xvr7xxx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CFE5E8C5-A7D2-4962-BBB0-8507F41B35B8", "versionEndIncluding": "2021-7", "versionStartIncluding": "2017-7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:xvr7xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "036DF596-F7AE-48FC-A862-2F5267B4B5C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:hcvr7xxx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F49454AC-EB35-41A5-9CC8-3116C02B447E", "versionEndIncluding": "2021-7", "versionStartIncluding": "2017-7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:hcvr7xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF15D7BC-70E1-43E3-B54E-9848F67E9AE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:hcvr8xxx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9EFA83B-4DC1-4936-BDCA-0A3846201F6F", "versionEndIncluding": "2021-7", "versionStartIncluding": "2017-7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:hcvr8xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7DF9BAE-3446-438B-BD14-0E450815CFEF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:vtox20xf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ADE8A4D8-1D43-4241-B723-FAD1A8804688", "versionEndIncluding": "2021-7", "versionStartIncluding": "2017-7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:vtox20xf:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A17A30F-F376-4438-A331-372DC1AA4073", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:asc2204c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8EEB9746-4F02-4125-9022-C7D995B8C1B5", "versionEndIncluding": "2021-7", "versionStartIncluding": "2017-7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:asc2204c:-:*:*:*:*:*:*:*", "matchCriteriaId": "421A373F-AC77-4CAF-BE0F-D53F4E29D520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Some Dahua products have access control vulnerability in the password reset process. Attackers can exploit this vulnerability through specific deployments to reset device passwords." }, { "lang": "es", "value": "Algunos productos Dahua presentan una vulnerabilidad de control de acceso en el proceso de restablecimiento de la contrase\u00f1a. Los atacantes pueden explotar esta vulnerabilidad mediante implementaciones espec\u00edficas para restablecer las contrase\u00f1as de los dispositivos" } ], "id": "CVE-2021-33046", "lastModified": "2024-11-21T06:08:11.233", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-01-13T21:15:07.753", "references": [ { "source": "cybersecurity@dahuatech.com", "tags": [ "Vendor Advisory" ], "url": "https://support.dahuatech.com/networkSecurity/securityDetails?id=95" }, { "source": "cybersecurity@dahuatech.com", "tags": [ "Not Applicable" ], "url": "https://www.dahuasecurity.com/support/cybersecurity/details/957" }, { "source": "cybersecurity@dahuatech.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dahuasecurity.com/support/cybersecurity/details/987" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.dahuatech.com/networkSecurity/securityDetails?id=95" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "https://www.dahuasecurity.com/support/cybersecurity/details/957" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.dahuasecurity.com/support/cybersecurity/details/987" } ], "sourceIdentifier": "cybersecurity@dahuatech.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:sd6al_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1CE773D-CA5F-483C-B20C-DAD30A590DDD", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:sd6al:-:*:*:*:*:*:*:*", "matchCriteriaId": "C35F4371-334B-4EA8-8F48-498C81652F7C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:sd5a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "083AE420-CAF9-4A2A-8C76-79DD590FA191", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:sd5a:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EE24474-EF35-4475-99DD-4B54D6AF0B2D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:sd1a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A075994-60D1-40B7-9EF6-8048CBC18764", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:sd1a:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A3C5893-E1D0-4E06-9F7F-058B657E4493", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ptz1a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F78D2E9E-9909-4130-A146-CA861F7DF341", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ptz1a:-:*:*:*:*:*:*:*", "matchCriteriaId": "19B57B9D-0729-48E0-892B-E39AE1F89AB4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:sd50_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "18CD222C-C95A-4D5E-A763-5D2F74EAEC04", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:sd50:-:*:*:*:*:*:*:*", "matchCriteriaId": "984AD4D5-D689-4150-A1EE-D48B81CBB7C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:sd52c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0ECBC0BF-171E-49FD-B6AF-CC7B29D39FB7", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:sd52c:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BA0D206-5BE7-4592-8D3E-641F47164770", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hx5842h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E8CB654-0526-4E7A-8984-8350B39BB4DF", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hx5842h:-:*:*:*:*:*:*:*", "matchCriteriaId": "724F4B7D-C8C1-4914-B1D6-B4CB9B1F4093", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hx7842h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AEBFC1D-9F25-4FDB-A191-D7D6C1C6E234", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hx7842h:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D6E27D8-C608-49E7-8284-5196EDB428DB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hx2xxx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A046C7EA-F954-4F36-9ED3-DBA84F1FB2D3", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hx2xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B8887C8-C335-4EBB-BC7F-D4F8D8205DAE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hxxx5x4x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCD8DCD2-5CEA-420F-860C-11B469D9FF8F", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hxxx5x4x:-:*:*:*:*:*:*:*", "matchCriteriaId": "F051A1A0-E841-42E7-92A3-E45E4017DCDE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n42b1p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F092AA97-7184-4499-BB83-D6204BD4621B", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n42b1p:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCB3A7FD-63A2-423C-912F-E2E5B4690CF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n42b2p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "855B3C5F-CE9D-4FFA-B485-11A8D675F006", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n42b2p:-:*:*:*:*:*:*:*", "matchCriteriaId": "83B0FAFA-BEF4-4196-A4BC-4CFD6DCF4986", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n42b3p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D0E03DE-1BFA-43AD-9AC6-72A1A1545D4B", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n42b3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B51E9FED-4929-42CC-AA6F-BFF61E8F88C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n52a4p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F20B6467-53DC-4DC6-BCC2-6B6B33ABD65D", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n52a4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB41CE1D-1A97-4549-A849-D06F78858CA3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n54a4p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFA91720-5AE4-48B6-A940-A4DBE650591D", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n54a4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "D479D171-7F30-4D6B-8A49-0A3967103B94", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n52b2p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ACD4FD87-1D74-4895-AA89-D26541A55433", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n52b2p:-:*:*:*:*:*:*:*", "matchCriteriaId": "7936F0A3-F6DF-47B2-898E-DBE68B369633", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n52b5p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D5136C6-2355-4782-BF9C-0874DC5B0CDA", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n52b5p:-:*:*:*:*:*:*:*", "matchCriteriaId": "195D7533-B2EF-4BC2-B6D6-0B141FB90090", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n52b3p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7180D6E1-6F7F-4EAD-BD51-02C029EFB034", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n52b3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "03D1AD58-447D-4D30-B9CF-48B5CB743C2B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n54b2p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEC0287A-824B-46D0-84AB-54BEEF90E16B", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n54b2p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5667962D-1A47-4D77-95A4-6B34F8863761", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hdbw1320e-w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CBF6051-B1DF-4028-ADC1-CF3820C1CA71", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hdbw1320e-w:-:*:*:*:*:*:*:*", "matchCriteriaId": "F221BD07-E754-4355-B031-A95147905815", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Some Dahua products with Build time before December 2019 have Session ID predictable vulnerabilities. During normal user access, an attacker can use the predicted Session ID to construct a data packet to attack the device." }, { "lang": "es", "value": "Algunos productos Dahua con tiempo de Compilaci\u00f3n antes de diciembre de 2019 presentan vulnerabilidades predecibles del ID de Sesi\u00f3n. Durante un acceso de usuario normal, un atacante puede usar el ID de Sesi\u00f3n previsto para construir un paquete de datos para atacar el dispositivo." } ], "id": "CVE-2020-9502", "lastModified": "2024-11-21T05:40:47.147", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-05-13T16:15:13.277", "references": [ { "source": "cybersecurity@dahuatech.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dahuasecurity.com/support/cybersecurity/details/777" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.dahuasecurity.com/support/cybersecurity/details/777" } ], "sourceIdentifier": "cybersecurity@dahuatech.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-330" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:sd6al_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1CE773D-CA5F-483C-B20C-DAD30A590DDD", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:sd6al:-:*:*:*:*:*:*:*", "matchCriteriaId": "C35F4371-334B-4EA8-8F48-498C81652F7C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:sd5a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "083AE420-CAF9-4A2A-8C76-79DD590FA191", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:sd5a:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EE24474-EF35-4475-99DD-4B54D6AF0B2D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:sd1a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A075994-60D1-40B7-9EF6-8048CBC18764", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:sd1a:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A3C5893-E1D0-4E06-9F7F-058B657E4493", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ptz1a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F78D2E9E-9909-4130-A146-CA861F7DF341", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ptz1a:-:*:*:*:*:*:*:*", "matchCriteriaId": "19B57B9D-0729-48E0-892B-E39AE1F89AB4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:sd50_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "18CD222C-C95A-4D5E-A763-5D2F74EAEC04", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:sd50:-:*:*:*:*:*:*:*", "matchCriteriaId": "984AD4D5-D689-4150-A1EE-D48B81CBB7C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:sd52c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0ECBC0BF-171E-49FD-B6AF-CC7B29D39FB7", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:sd52c:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BA0D206-5BE7-4592-8D3E-641F47164770", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hx5842h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E8CB654-0526-4E7A-8984-8350B39BB4DF", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hx5842h:-:*:*:*:*:*:*:*", "matchCriteriaId": "724F4B7D-C8C1-4914-B1D6-B4CB9B1F4093", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hx7842h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AEBFC1D-9F25-4FDB-A191-D7D6C1C6E234", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hx7842h:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D6E27D8-C608-49E7-8284-5196EDB428DB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hx2xxx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A046C7EA-F954-4F36-9ED3-DBA84F1FB2D3", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hx2xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B8887C8-C335-4EBB-BC7F-D4F8D8205DAE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hxxx5x4x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCD8DCD2-5CEA-420F-860C-11B469D9FF8F", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hxxx5x4x:-:*:*:*:*:*:*:*", "matchCriteriaId": "F051A1A0-E841-42E7-92A3-E45E4017DCDE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n42b1p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F092AA97-7184-4499-BB83-D6204BD4621B", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n42b1p:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCB3A7FD-63A2-423C-912F-E2E5B4690CF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n42b2p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "855B3C5F-CE9D-4FFA-B485-11A8D675F006", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n42b2p:-:*:*:*:*:*:*:*", "matchCriteriaId": "83B0FAFA-BEF4-4196-A4BC-4CFD6DCF4986", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n42b3p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D0E03DE-1BFA-43AD-9AC6-72A1A1545D4B", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n42b3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B51E9FED-4929-42CC-AA6F-BFF61E8F88C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n52a4p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F20B6467-53DC-4DC6-BCC2-6B6B33ABD65D", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n52a4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB41CE1D-1A97-4549-A849-D06F78858CA3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n54a4p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFA91720-5AE4-48B6-A940-A4DBE650591D", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n54a4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "D479D171-7F30-4D6B-8A49-0A3967103B94", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n52b2p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ACD4FD87-1D74-4895-AA89-D26541A55433", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n52b2p:-:*:*:*:*:*:*:*", "matchCriteriaId": "7936F0A3-F6DF-47B2-898E-DBE68B369633", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n52b5p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D5136C6-2355-4782-BF9C-0874DC5B0CDA", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n52b5p:-:*:*:*:*:*:*:*", "matchCriteriaId": "195D7533-B2EF-4BC2-B6D6-0B141FB90090", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n52b3p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7180D6E1-6F7F-4EAD-BD51-02C029EFB034", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n52b3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "03D1AD58-447D-4D30-B9CF-48B5CB743C2B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n54b2p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEC0287A-824B-46D0-84AB-54BEEF90E16B", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n54b2p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5667962D-1A47-4D77-95A4-6B34F8863761", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hdbw1320e-w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CBF6051-B1DF-4028-ADC1-CF3820C1CA71", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hdbw1320e-w:-:*:*:*:*:*:*:*", "matchCriteriaId": "F221BD07-E754-4355-B031-A95147905815", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dahua devices with Build time before December 2019 use strong security login mode by default, but in order to be compatible with the normal login of early devices, some devices retain the weak security login mode that users can control. If the user uses a weak security login method, an attacker can monitor the device network to intercept network packets to attack the device. So it is recommended that the user disable this login method." }, { "lang": "es", "value": "Los dispositivos Dahua con tiempo de Compilaci\u00f3n antes de diciembre de 2019, usan un modo de inicio de sesi\u00f3n de seguridad fuerte por defecto, pero en funci\u00f3n de ser compatibles con el inicio de sesi\u00f3n normal de los primeros dispositivos, algunos dispositivos conservan el modo de inicio de sesi\u00f3n de seguridad d\u00e9bil que los usuarios pueden controlar. Si el usuario usa un m\u00e9todo de inicio de sesi\u00f3n de seguridad d\u00e9bil, un atacante puede monitorear la red del dispositivo para interceptar los paquetes de red para atacar el dispositivo. Por lo tanto, es recomendado que el usuario desactive este m\u00e9todo de inicio de sesi\u00f3n." } ], "id": "CVE-2019-9682", "lastModified": "2024-11-21T04:52:06.380", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-05-13T16:15:12.870", "references": [ { "source": "cybersecurity@dahuatech.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dahuasecurity.com/support/cybersecurity/details/767" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.dahuasecurity.com/support/cybersecurity/details/767" } ], "sourceIdentifier": "cybersecurity@dahuatech.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2020-9499
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.dahuasecurity.com/support/cybersecurity/details/727 | x_refsource_MISC |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | IPC-HX2XXX Series,IPC-HXXX5X4X Series,IPC-HX5842H,IPC-HX7842H,NVR 5x Series,NVR 4x Series,SD6AL Series,SD5A Series,SD1A Series,PTZ1A Series,SD50/52C Series |
Version: Versions which Build time before December,2019 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:34:38.218Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.dahuasecurity.com/support/cybersecurity/details/727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "IPC-HX2XXX Series,IPC-HXXX5X4X Series,IPC-HX5842H,IPC-HX7842H,NVR 5x Series,NVR 4x Series,SD6AL Series,SD5A Series,SD1A Series,PTZ1A Series,SD50/52C Series", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Versions which Build time before December,2019" } ] } ], "descriptions": [ { "lang": "en", "value": "Some Dahua products have buffer overflow vulnerabilities. After the successful login of the legal account, the attacker sends a specific DDNS test command, which may cause the device to go down." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-09T13:19:23", "orgId": "79ee569e-7d1e-4364-98f0-3a18e2a739ad", "shortName": "dahua" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.dahuasecurity.com/support/cybersecurity/details/727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cybersecurity@dahuatech.com", "ID": "CVE-2020-9499", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "IPC-HX2XXX Series,IPC-HXXX5X4X Series,IPC-HX5842H,IPC-HX7842H,NVR 5x Series,NVR 4x Series,SD6AL Series,SD5A Series,SD1A Series,PTZ1A Series,SD50/52C Series", "version": { "version_data": [ { "version_value": "Versions which Build time before December,2019" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Some Dahua products have buffer overflow vulnerabilities. After the successful login of the legal account, the attacker sends a specific DDNS test command, which may cause the device to go down." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.dahuasecurity.com/support/cybersecurity/details/727", "refsource": "MISC", "url": "https://www.dahuasecurity.com/support/cybersecurity/details/727" } ] } } } }, "cveMetadata": { "assignerOrgId": "79ee569e-7d1e-4364-98f0-3a18e2a739ad", "assignerShortName": "dahua", "cveId": "CVE-2020-9499", "datePublished": "2020-04-09T13:19:23", "dateReserved": "2020-03-01T00:00:00", "dateUpdated": "2024-08-04T10:34:38.218Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-33046
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.dahuasecurity.com/support/cybersecurity/details/957 | x_refsource_MISC | |
https://www.dahuasecurity.com/support/cybersecurity/details/987 | x_refsource_CONFIRM | |
https://support.dahuatech.com/networkSecurity/securityDetails?id=95 | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Access control vulnerability found in some Dahua products |
Version: Dahua IP Camera devices IPC-HX3XXX, and IPC-HX5XXX Version: PTZ Dome Camera SD1A1, SD22, SD49, SD50, SD52C, and SD6AL Version: Thermal TPC-BF1241,TPC-BF2221, TPC-SD2221 Version: VTO2101E, VTOX221E, and ASC2204C devices Buildtime between 2017/7 ~ 2021/7. NVR devices NVR4XXX, and NVR5XXX Version: XVR devices XVR4XXX, and XVR5XXX Version: HCVR devices HCVR7XXX, and HCVR8XXX devices Buildtime between 2017/1 ~ 2021/7. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:42:19.550Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.dahuasecurity.com/support/cybersecurity/details/957" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.dahuasecurity.com/support/cybersecurity/details/987" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.dahuatech.com/networkSecurity/securityDetails?id=95" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Access control vulnerability found in some Dahua products", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Dahua IP Camera devices IPC-HX3XXX, and IPC-HX5XXX" }, { "status": "affected", "version": "PTZ Dome Camera SD1A1, SD22, SD49, SD50, SD52C, and SD6AL" }, { "status": "affected", "version": "Thermal TPC-BF1241,TPC-BF2221, TPC-SD2221" }, { "status": "affected", "version": "VTO2101E, VTOX221E, and ASC2204C devices Buildtime between 2017/7 ~ 2021/7. NVR devices NVR4XXX, and NVR5XXX" }, { "status": "affected", "version": "XVR devices XVR4XXX, and XVR5XXX" }, { "status": "affected", "version": "HCVR devices HCVR7XXX, and HCVR8XXX devices Buildtime between 2017/1 ~ 2021/7." } ] } ], "descriptions": [ { "lang": "en", "value": "Some Dahua products have access control vulnerability in the password reset process. Attackers can exploit this vulnerability through specific deployments to reset device passwords." } ], "problemTypes": [ { "descriptions": [ { "description": "Access control", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-14T18:49:15", "orgId": "79ee569e-7d1e-4364-98f0-3a18e2a739ad", "shortName": "dahua" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.dahuasecurity.com/support/cybersecurity/details/957" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.dahuasecurity.com/support/cybersecurity/details/987" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.dahuatech.com/networkSecurity/securityDetails?id=95" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cybersecurity@dahuatech.com", "ID": "CVE-2021-33046", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Access control vulnerability found in some Dahua products", "version": { "version_data": [ { "version_value": "Dahua IP Camera devices IPC-HX3XXX, and IPC-HX5XXX" }, { "version_value": "PTZ Dome Camera SD1A1, SD22, SD49, SD50, SD52C, and SD6AL" }, { "version_value": "Thermal TPC-BF1241,TPC-BF2221, TPC-SD2221" }, { "version_value": "VTO2101E, VTOX221E, and ASC2204C devices Buildtime between 2017/7 ~ 2021/7. NVR devices NVR4XXX, and NVR5XXX" }, { "version_value": "XVR devices XVR4XXX, and XVR5XXX" }, { "version_value": "HCVR devices HCVR7XXX, and HCVR8XXX devices Buildtime between 2017/1 ~ 2021/7." } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Some Dahua products have access control vulnerability in the password reset process. Attackers can exploit this vulnerability through specific deployments to reset device passwords." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Access control" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.dahuasecurity.com/support/cybersecurity/details/957", "refsource": "MISC", "url": "https://www.dahuasecurity.com/support/cybersecurity/details/957" }, { "name": "https://www.dahuasecurity.com/support/cybersecurity/details/987", "refsource": "CONFIRM", "url": "https://www.dahuasecurity.com/support/cybersecurity/details/987" }, { "name": "https://support.dahuatech.com/networkSecurity/securityDetails?id=95", "refsource": "CONFIRM", "url": "https://support.dahuatech.com/networkSecurity/securityDetails?id=95" } ] } } } }, "cveMetadata": { "assignerOrgId": "79ee569e-7d1e-4364-98f0-3a18e2a739ad", "assignerShortName": "dahua", "cveId": "CVE-2021-33046", "datePublished": "2022-01-13T20:27:13", "dateReserved": "2021-05-17T00:00:00", "dateUpdated": "2024-08-03T23:42:19.550Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-9682
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.dahuasecurity.com/support/cybersecurity/details/767 | x_refsource_MISC |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | IPC-HX2XXX Series,IPC-HXXX5X4X Series,IPC-HX5842H,IPC-HX7842H,NVR 5x Series,NVR 4x Series,SD6AL Series,SD5A Series,SD1A Series,PTZ1A Series,SD50/52C Series,IPC-HDBW1320E-W |
Version: Versions which Build time before December,2019 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T21:54:45.174Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.dahuasecurity.com/support/cybersecurity/details/767" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "IPC-HX2XXX Series,IPC-HXXX5X4X Series,IPC-HX5842H,IPC-HX7842H,NVR 5x Series,NVR 4x Series,SD6AL Series,SD5A Series,SD1A Series,PTZ1A Series,SD50/52C Series,IPC-HDBW1320E-W", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Versions which Build time before December,2019" } ] } ], "descriptions": [ { "lang": "en", "value": "Dahua devices with Build time before December 2019 use strong security login mode by default, but in order to be compatible with the normal login of early devices, some devices retain the weak security login mode that users can control. If the user uses a weak security login method, an attacker can monitor the device network to intercept network packets to attack the device. So it is recommended that the user disable this login method." } ], "problemTypes": [ { "descriptions": [ { "description": "Replay Attacks", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-05-13T15:10:43", "orgId": "79ee569e-7d1e-4364-98f0-3a18e2a739ad", "shortName": "dahua" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.dahuasecurity.com/support/cybersecurity/details/767" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cybersecurity@dahuatech.com", "ID": "CVE-2019-9682", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "IPC-HX2XXX Series,IPC-HXXX5X4X Series,IPC-HX5842H,IPC-HX7842H,NVR 5x Series,NVR 4x Series,SD6AL Series,SD5A Series,SD1A Series,PTZ1A Series,SD50/52C Series,IPC-HDBW1320E-W", "version": { "version_data": [ { "version_value": "Versions which Build time before December,2019" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Dahua devices with Build time before December 2019 use strong security login mode by default, but in order to be compatible with the normal login of early devices, some devices retain the weak security login mode that users can control. If the user uses a weak security login method, an attacker can monitor the device network to intercept network packets to attack the device. So it is recommended that the user disable this login method." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Replay Attacks" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.dahuasecurity.com/support/cybersecurity/details/767", "refsource": "MISC", "url": "https://www.dahuasecurity.com/support/cybersecurity/details/767" } ] } } } }, "cveMetadata": { "assignerOrgId": "79ee569e-7d1e-4364-98f0-3a18e2a739ad", "assignerShortName": "dahua", "cveId": "CVE-2019-9682", "datePublished": "2020-05-13T15:10:43", "dateReserved": "2019-03-11T00:00:00", "dateUpdated": "2024-08-04T21:54:45.174Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-9500
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.dahuasecurity.com/support/cybersecurity/details/727 | x_refsource_MISC |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | IPC-HX2XXX Series,IPC-HXXX5X4X Series,IPC-HX5842H,IPC-HX7842H,NVR 5x Series,NVR 4x Series,SD6AL Series,SD5A Series,SD1A Series,PTZ1A Series,SD50/52C Series |
Version: Versions which Build time before December,2019 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:34:37.927Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.dahuasecurity.com/support/cybersecurity/details/727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "IPC-HX2XXX Series,IPC-HXXX5X4X Series,IPC-HX5842H,IPC-HX7842H,NVR 5x Series,NVR 4x Series,SD6AL Series,SD5A Series,SD1A Series,PTZ1A Series,SD50/52C Series", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Versions which Build time before December,2019" } ] } ], "descriptions": [ { "lang": "en", "value": "Some products of Dahua have Denial of Service vulnerabilities. After the successful login of the legal account, the attacker sends a specific log query command, which may cause the device to go down." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-09T13:21:01", "orgId": "79ee569e-7d1e-4364-98f0-3a18e2a739ad", "shortName": "dahua" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.dahuasecurity.com/support/cybersecurity/details/727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cybersecurity@dahuatech.com", "ID": "CVE-2020-9500", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "IPC-HX2XXX Series,IPC-HXXX5X4X Series,IPC-HX5842H,IPC-HX7842H,NVR 5x Series,NVR 4x Series,SD6AL Series,SD5A Series,SD1A Series,PTZ1A Series,SD50/52C Series", "version": { "version_data": [ { "version_value": "Versions which Build time before December,2019" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Some products of Dahua have Denial of Service vulnerabilities. After the successful login of the legal account, the attacker sends a specific log query command, which may cause the device to go down." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.dahuasecurity.com/support/cybersecurity/details/727", "refsource": "MISC", "url": "https://www.dahuasecurity.com/support/cybersecurity/details/727" } ] } } } }, "cveMetadata": { "assignerOrgId": "79ee569e-7d1e-4364-98f0-3a18e2a739ad", "assignerShortName": "dahua", "cveId": "CVE-2020-9500", "datePublished": "2020-04-09T13:21:01", "dateReserved": "2020-03-01T00:00:00", "dateUpdated": "2024-08-04T10:34:37.927Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-9502
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.dahuasecurity.com/support/cybersecurity/details/777 | x_refsource_MISC |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | IPC-HX2XXX Series,IPC-HXXX5X4X Series,IPC-HX5842H,IPC-HX7842H,NVR 5x Series,NVR 4x Series,SD6AL Series,SD5A Series,SD1A Series,PTZ1A Series,SD50/52C Series,IPC-HFW1431S |
Version: Versions which Build time before December,2019 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:34:38.156Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.dahuasecurity.com/support/cybersecurity/details/777" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "IPC-HX2XXX Series,IPC-HXXX5X4X Series,IPC-HX5842H,IPC-HX7842H,NVR 5x Series,NVR 4x Series,SD6AL Series,SD5A Series,SD1A Series,PTZ1A Series,SD50/52C Series,IPC-HFW1431S", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Versions which Build time before December,2019" } ] } ], "descriptions": [ { "lang": "en", "value": "Some Dahua products with Build time before December 2019 have Session ID predictable vulnerabilities. During normal user access, an attacker can use the predicted Session ID to construct a data packet to attack the device." } ], "problemTypes": [ { "descriptions": [ { "description": "Session hijacking", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-05-13T15:21:12", "orgId": "79ee569e-7d1e-4364-98f0-3a18e2a739ad", "shortName": "dahua" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.dahuasecurity.com/support/cybersecurity/details/777" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cybersecurity@dahuatech.com", "ID": "CVE-2020-9502", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "IPC-HX2XXX Series,IPC-HXXX5X4X Series,IPC-HX5842H,IPC-HX7842H,NVR 5x Series,NVR 4x Series,SD6AL Series,SD5A Series,SD1A Series,PTZ1A Series,SD50/52C Series,IPC-HFW1431S", "version": { "version_data": [ { "version_value": "Versions which Build time before December,2019" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Some Dahua products with Build time before December 2019 have Session ID predictable vulnerabilities. During normal user access, an attacker can use the predicted Session ID to construct a data packet to attack the device." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Session hijacking" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.dahuasecurity.com/support/cybersecurity/details/777", "refsource": "MISC", "url": "https://www.dahuasecurity.com/support/cybersecurity/details/777" } ] } } } }, "cveMetadata": { "assignerOrgId": "79ee569e-7d1e-4364-98f0-3a18e2a739ad", "assignerShortName": "dahua", "cveId": "CVE-2020-9502", "datePublished": "2020-05-13T15:21:12", "dateReserved": "2020-03-01T00:00:00", "dateUpdated": "2024-08-04T10:34:38.156Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-202004-1824
Vulnerability from variot
Some products of Dahua have Denial of Service vulnerabilities. After the successful login of the legal account, the attacker sends a specific log query command, which may cause the device to go down. Dahua There is an input verification vulnerability in.Service operation interruption (DoS) It may be put into a state. Dahua SD6AL Series and others are products of China Dahua Company. SD6AL Series is a SD6AL series network camera. NVR 5x Series is a 5x series network video recorder. IPC-HX2XXX Series is an IPC-HX2XXX series network camera.
There are security holes in many Dahua products
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202004-1824", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ipc-hx7842h", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "n42b3p", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "sd1a", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "n42b2p", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "n52b3p", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "n52b2p", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "n52a4p", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "sd50", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "n52b5p", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "ipc-hx5842h", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "n42b1p", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "sd5a", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "sd6al", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "n54a4p", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "ipc-hxxx5x4x", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "ptz1a", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "sd52c", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "n54b2p", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "ipc-hx2xxx", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "ipc-hx2xxx", "scope": null, "trust": 0.8, "vendor": "dahua", "version": null }, { "model": "ipc-hx5842h", "scope": null, "trust": 0.8, "vendor": "dahua", "version": null }, { "model": "ipc-hx7842h", "scope": null, "trust": 0.8, "vendor": "dahua", "version": null }, { "model": "ipc-hxxx5x4x", "scope": null, "trust": 0.8, "vendor": "dahua", "version": null }, { "model": "ptz1a", "scope": null, "trust": 0.8, "vendor": "dahua", "version": null }, { "model": "sd1a", "scope": null, "trust": 0.8, "vendor": "dahua", "version": null }, { "model": "sd50", "scope": null, "trust": 0.8, "vendor": "dahua", "version": null }, { "model": "sd52c", "scope": null, "trust": 0.8, "vendor": "dahua", "version": null }, { "model": "sd5a", "scope": null, "trust": 0.8, "vendor": "dahua", "version": null }, { "model": "sd6al", "scope": null, "trust": 0.8, "vendor": "dahua", "version": null }, { "model": "sd 6al series", "scope": null, "trust": 0.6, "vendor": "dahua", "version": null }, { "model": "sd 5a series", "scope": null, "trust": 0.6, "vendor": "dahua", "version": null }, { "model": "sd 1a series", "scope": null, "trust": 0.6, "vendor": "dahua", "version": null }, { "model": "sd 50/52c series", "scope": null, "trust": 0.6, "vendor": "dahua", "version": null }, { "model": "nvr n5x series", "scope": null, "trust": 0.6, "vendor": "dahua", "version": null }, { "model": "nvr n4x series", "scope": null, "trust": 0.6, "vendor": "dahua", "version": null }, { "model": "ipc n4 series", "scope": null, "trust": 0.6, "vendor": "dahua", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-22980" }, { "db": "JVNDB", "id": "JVNDB-2020-003799" }, { "db": "NVD", "id": "CVE-2020-9500" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:sd6al_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahuasecurity:sd6al:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:sd5a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahuasecurity:sd5a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:sd1a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahuasecurity:sd1a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:ptz1a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahuasecurity:ptz1a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:sd50_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahuasecurity:sd50:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:sd52c_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahuasecurity:sd52c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:ipc-hx5842h_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahuasecurity:ipc-hx5842h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:ipc-hx7842h_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahuasecurity:ipc-hx7842h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:ipc-hx2xxx_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahuasecurity:ipc-hx2xxx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:ipc-hxxx5x4x_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahuasecurity:ipc-hxxx5x4x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:n42b1p_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahuasecurity:n42b1p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:n42b2p_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahuasecurity:n42b2p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:n42b3p_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahuasecurity:n42b3p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:n52a4p_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahuasecurity:n52a4p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:n54a4p_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahua:n54a4p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:n52b2p_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahuasecurity:n52b2p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:n52b5p_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahuasecurity:n52b5p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:n52b3p_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahuasecurity:n52b3p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:n54b2p_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahuasecurity:n54b2p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9500" } ] }, "cve": "CVE-2020-9500", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2020-003799", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "exploitabilityScore": 6.4, "id": "CNVD-2020-22980", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:M/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.2, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2020-003799", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-9500", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "JVNDB-2020-003799", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2020-22980", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202004-554", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-22980" }, { "db": "JVNDB", "id": "JVNDB-2020-003799" }, { "db": "NVD", "id": "CVE-2020-9500" }, { "db": "CNNVD", "id": "CNNVD-202004-554" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Some products of Dahua have Denial of Service vulnerabilities. After the successful login of the legal account, the attacker sends a specific log query command, which may cause the device to go down. Dahua There is an input verification vulnerability in.Service operation interruption (DoS) It may be put into a state. Dahua SD6AL Series and others are products of China Dahua Company. SD6AL Series is a SD6AL series network camera. NVR 5x Series is a 5x series network video recorder. IPC-HX2XXX Series is an IPC-HX2XXX series network camera. \n\r\n\r\nThere are security holes in many Dahua products", "sources": [ { "db": "NVD", "id": "CVE-2020-9500" }, { "db": "JVNDB", "id": "JVNDB-2020-003799" }, { "db": "CNVD", "id": "CNVD-2020-22980" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9500", "trust": 3.0 }, { "db": "JVNDB", "id": "JVNDB-2020-003799", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-22980", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202004-554", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-22980" }, { "db": "JVNDB", "id": "JVNDB-2020-003799" }, { "db": "NVD", "id": "CVE-2020-9500" }, { "db": "CNNVD", "id": "CNNVD-202004-554" } ] }, "id": "VAR-202004-1824", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-22980" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-22980" } ] }, "last_update_date": "2023-12-18T13:28:09.084000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "DHCC-SA-202004-001", "trust": 0.8, "url": "https://www.dahuasecurity.com/support/cybersecurity/details/727" }, { "title": "Patch for Multiple Dahua product input verification error vulnerabilities (CNVD-2020-22980)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/213933" }, { "title": "Multiple Dahua Product input verification error vulnerability fixes", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=115747" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-22980" }, { "db": "JVNDB", "id": "JVNDB-2020-003799" }, { "db": "CNNVD", "id": "CNNVD-202004-554" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003799" }, { "db": "NVD", "id": "CVE-2020-9500" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://www.dahuasecurity.com/support/cybersecurity/details/727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9500" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-9500" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003799" }, { "db": "NVD", "id": "CVE-2020-9500" }, { "db": "CNNVD", "id": "CNNVD-202004-554" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-22980" }, { "db": "JVNDB", "id": "JVNDB-2020-003799" }, { "db": "NVD", "id": "CVE-2020-9500" }, { "db": "CNNVD", "id": "CNNVD-202004-554" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-04-15T00:00:00", "db": "CNVD", "id": "CNVD-2020-22980" }, { "date": "2020-04-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-003799" }, { "date": "2020-04-09T14:15:13.260000", "db": "NVD", "id": "CVE-2020-9500" }, { "date": "2020-04-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-554" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-12T00:00:00", "db": "CNVD", "id": "CNVD-2020-22980" }, { "date": "2020-04-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-003799" }, { "date": "2021-07-21T11:39:23.747000", "db": "NVD", "id": "CVE-2020-9500" }, { "date": "2020-05-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-554" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-554" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Dahua Input verification vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003799" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-554" } ], "trust": 0.6 } }
var-202004-1823
Vulnerability from variot
Some Dahua products have buffer overflow vulnerabilities. After the successful login of the legal account, the attacker sends a specific DDNS test command, which may cause the device to go down. Dahua The product contains a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Dahua SD6AL Series and others are products of China Dahua Company. SD6AL Series is a SD6AL series network camera. NVR 5x Series is a 5x series network video recorder. IPC-HX2XXX Series is an IPC-HX2XXX series network camera
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202004-1823", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ipc-hx7842h", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "n42b3p", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "sd1a", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "n42b2p", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "n52b3p", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "n52b2p", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "n52a4p", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "sd50", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "n52b5p", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "ipc-hx5842h", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "n42b1p", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "sd5a", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "sd6al", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "n54a4p", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "ipc-hxxx5x4x", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "ptz1a", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "sd52c", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "n54b2p", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "ipc-hx2xxx", "scope": "lt", "trust": 1.0, "vendor": "dahuasecurity", "version": "2019-12" }, { "model": "ipc-hx2xxx", "scope": null, "trust": 0.8, "vendor": "dahua", "version": null }, { "model": "ipc-hx5842h", "scope": null, "trust": 0.8, "vendor": "dahua", "version": null }, { "model": "ipc-hx7842h", "scope": null, "trust": 0.8, "vendor": "dahua", "version": null }, { "model": "ipc-hxxx5x4x", "scope": null, "trust": 0.8, "vendor": "dahua", "version": null }, { "model": "ptz1a", "scope": null, "trust": 0.8, "vendor": "dahua", "version": null }, { "model": "sd1a", "scope": null, "trust": 0.8, "vendor": "dahua", "version": null }, { "model": "sd50", "scope": null, "trust": 0.8, "vendor": "dahua", "version": null }, { "model": "sd52c", "scope": null, "trust": 0.8, "vendor": "dahua", "version": null }, { "model": "sd5a", "scope": null, "trust": 0.8, "vendor": "dahua", "version": null }, { "model": "sd6al", "scope": null, "trust": 0.8, "vendor": "dahua", "version": null }, { "model": "sd 6al series", "scope": null, "trust": 0.6, "vendor": "dahua", "version": null }, { "model": "sd 5a series", "scope": null, "trust": 0.6, "vendor": "dahua", "version": null }, { "model": "sd 1a series", "scope": null, "trust": 0.6, "vendor": "dahua", "version": null }, { "model": "sd 50/52c series", "scope": null, "trust": 0.6, "vendor": "dahua", "version": null }, { "model": "nvr n5x series", "scope": null, "trust": 0.6, "vendor": "dahua", "version": null }, { "model": "nvr n4x series", "scope": null, "trust": 0.6, "vendor": "dahua", "version": null }, { "model": "ipc n4 series", "scope": null, "trust": 0.6, "vendor": "dahua", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-22979" }, { "db": "JVNDB", "id": "JVNDB-2020-003798" }, { "db": "NVD", "id": "CVE-2020-9499" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:sd6al_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahuasecurity:sd6al:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:sd5a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahuasecurity:sd5a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:sd1a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahuasecurity:sd1a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:ptz1a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahuasecurity:ptz1a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:sd50_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahuasecurity:sd50:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:sd52c_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahuasecurity:sd52c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:ipc-hx5842h_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahuasecurity:ipc-hx5842h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:ipc-hx7842h_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahuasecurity:ipc-hx7842h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:ipc-hx2xxx_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahuasecurity:ipc-hx2xxx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:ipc-hxxx5x4x_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahuasecurity:ipc-hxxx5x4x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:n42b1p_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahuasecurity:n42b1p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:n42b2p_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahuasecurity:n42b2p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:n42b3p_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahuasecurity:n42b3p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:n52a4p_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahuasecurity:n52a4p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:n54a4p_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahua:n54a4p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:n52b2p_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahuasecurity:n52b2p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:n52b5p_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahuasecurity:n52b5p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:n52b3p_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahuasecurity:n52b3p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dahuasecurity:n54b2p_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019-12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dahuasecurity:n54b2p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9499" } ] }, "cve": "CVE-2020-9499", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2020-003798", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.4, "id": "CNVD-2020-22979", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:M/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.2, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-003798", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-9499", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "JVNDB-2020-003798", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2020-22979", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202004-553", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-22979" }, { "db": "JVNDB", "id": "JVNDB-2020-003798" }, { "db": "NVD", "id": "CVE-2020-9499" }, { "db": "CNNVD", "id": "CNNVD-202004-553" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Some Dahua products have buffer overflow vulnerabilities. After the successful login of the legal account, the attacker sends a specific DDNS test command, which may cause the device to go down. Dahua The product contains a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Dahua SD6AL Series and others are products of China Dahua Company. SD6AL Series is a SD6AL series network camera. NVR 5x Series is a 5x series network video recorder. IPC-HX2XXX Series is an IPC-HX2XXX series network camera", "sources": [ { "db": "NVD", "id": "CVE-2020-9499" }, { "db": "JVNDB", "id": "JVNDB-2020-003798" }, { "db": "CNVD", "id": "CNVD-2020-22979" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9499", "trust": 3.0 }, { "db": "JVNDB", "id": "JVNDB-2020-003798", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-22979", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202004-553", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-22979" }, { "db": "JVNDB", "id": "JVNDB-2020-003798" }, { "db": "NVD", "id": "CVE-2020-9499" }, { "db": "CNNVD", "id": "CNNVD-202004-553" } ] }, "id": "VAR-202004-1823", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-22979" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-22979" } ] }, "last_update_date": "2023-12-18T13:51:55.682000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "DHCC-SA-202004-001", "trust": 0.8, "url": "https://www.dahuasecurity.com/support/cybersecurity/details/727" }, { "title": "Patch for Multiple Dahua product buffer overflow vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/213931" }, { "title": "Multiple Dahua Product Buffer Error Vulnerability Fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=115746" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-22979" }, { "db": "JVNDB", "id": "JVNDB-2020-003798" }, { "db": "CNNVD", "id": "CNNVD-202004-553" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003798" }, { "db": "NVD", "id": "CVE-2020-9499" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://www.dahuasecurity.com/support/cybersecurity/details/727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9499" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-9499" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003798" }, { "db": "NVD", "id": "CVE-2020-9499" }, { "db": "CNNVD", "id": "CNNVD-202004-553" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-22979" }, { "db": "JVNDB", "id": "JVNDB-2020-003798" }, { "db": "NVD", "id": "CVE-2020-9499" }, { "db": "CNNVD", "id": "CNNVD-202004-553" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-04-15T00:00:00", "db": "CNVD", "id": "CNVD-2020-22979" }, { "date": "2020-04-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-003798" }, { "date": "2020-04-09T14:15:13.213000", "db": "NVD", "id": "CVE-2020-9499" }, { "date": "2020-04-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-553" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-12T00:00:00", "db": "CNVD", "id": "CNVD-2020-22979" }, { "date": "2020-04-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-003798" }, { "date": "2021-04-19T14:57:26.277000", "db": "NVD", "id": "CVE-2020-9499" }, { "date": "2020-05-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-553" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-553" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Dahua Classic buffer overflow vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003798" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-553" } ], "trust": 0.6 } }