Search criteria
18 vulnerabilities found for iptv\/h.265_video_encoder_firmware by szuray
FKIE_CVE-2020-24218
Vulnerability from fkie_nvd - Published: 2020-10-06 14:15 - Updated: 2024-11-21 05:14
Severity ?
Summary
An issue was discovered on URayTech IPTV/H.264/H.265 video encoders through 1.97. Attackers can log in as root via the password that is hard-coded in the executable file.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/ | Exploit, Third Party Advisory | |
| cve@mitre.org | https://www.kb.cert.org/vuls/id/896979 | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/ | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/896979 | Third Party Advisory, US Government Resource |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:szuray:iptv\\/h.264_video_encoder_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A715A089-5F76-4B05-9D27-ECF926B29BCD",
"versionEndIncluding": "1.97",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:szuray:uaioe264-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6772748B-DB2F-4125-BC8E-0DCCDFED5F0C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uce264-1-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A9AE7634-FFF7-4AE8-98D5-067B28DD96D6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uce264-1wb-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E0E73A8-C4E7-4C05-803F-912F4E21270F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uce264-4-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBACB14A-712C-4DE0-A9BD-1BF2F6816FE4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uce264-8-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF1E322A-DFD5-4D69-8A15-8BA5139A9778",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhae264-16:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09FC49AC-7F1C-4E34-8177-08E56355818B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB155809-04A8-43D7-BC84-13EFF98366B9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-16p32:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7E94025-4A64-4CAA-BA50-9125E1FC4AE3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-1p2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D9014E7-CC03-4C8A-9843-F9FA07688D1B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-1p2-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C31A218C-B38B-42F2-843A-4BE90E77CFF5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-1s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "881936E0-4039-4F9C-94CD-14F78AB410F9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-1w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B727B793-08CD-4C52-84DE-EDA328E417F0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-1ws:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4EB82D6-F526-401B-9EFB-3EA901C08F67",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-4p8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA84AFBF-4A0D-4D25-A49C-E2EAAD6BF125",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1-4k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF980787-641D-446D-AA1D-743F01F35990",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-16:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC4811B8-C8F0-4B82-BA29-EDBFF5A8F757",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-16l-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7202172A-EF50-4BF0-ACFF-6E46D6461F03",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-16s-2u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CEC5476D-C310-483A-BE8A-92339449B9CA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28A40A8D-FE09-427C-B6EB-69C171F0D893",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1l-4k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C1B9FAB-7259-44C6-B847-31D41A919CC0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1lw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "604607A9-316B-491A-BF05-25A290ACC000",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A58748D-5CE3-4D4E-ADAE-01686CA6179A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1s-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F077FD0E-CADB-4D91-B3EC-C88E3210DC7C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1w-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7968808C-37EF-47A6-A676-2C355834CBE1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1wb-4g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8E5E944-7CDA-4945-97EB-3BE6AD52FABA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1wb-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "962EAD68-5CA1-4467-A2DA-8E6F04EFCB54",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1wbs-2b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A680278C-0B4F-4693-8DE0-07276B014B34",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1wbs-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46CE60FE-EAD2-4D22-A353-C520510ED39E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1ws-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CFAB7E7C-EE61-4210-9798-55E76248C054",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-2-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B4609D6-3CD7-4EE7-9B0B-4F3137481118",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61011F2F-4DFA-457E-8748-9CD69541F094",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-4-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D0D914D-4493-4B22-B865-267F0BC6AB1B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-4l-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C54D0860-2377-431B-9B2D-1994955194DE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FD70522-EEC0-446B-9D79-504E218459FF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-8-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "208AAB27-2650-4301-A7AE-82E2C0965C09",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-8l-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85CAA5AB-FF37-4D6B-957C-A030928D5AC7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-8s-2u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "639D6035-DC3C-46F4-9B37-65DCF34D222A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-16-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "647F1835-8012-47C9-9B6D-A596EB534B7A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-1l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7FA66B0-5442-4300-AD4D-593F87024E5E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-1l-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8962B531-7224-4F8C-89C9-3A77D45BEC8F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-1l-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10ED0FBA-AE37-4147-B82B-76B2A9B50133",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-1lw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F05BD245-85DD-4C2C-ACD9-B34A3D909785",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-1wb-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83C2D275-06A6-4D7B-89E4-89B332CED051",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-4l-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EDA97F59-C447-4B2E-990A-4549E2E81CAD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-8-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6D4D394-EA33-41E1-91D2-BB38FEBF165F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uve264-1l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B70B884-1671-4E9A-93F1-8BD18BB4C0B5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uve264-1lw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98CB39B7-4958-4492-B756-658385213BA9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:szuray:iptv\\/h.265_video_encoder_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9B8BC95B-B460-493F-B936-9D17E3DC3422",
"versionEndIncluding": "1.97",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:szuray:uaioe265-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E2650DF-89F0-4AD6-B7FE-FD3BDE3D2B17",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhae265-1-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F08B9C9-E5D8-4C7C-A887-99295D60A212",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhae265-1wb-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3A44F97-E862-4F58-92D1-EAA294153D95",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhae265-4-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86C44E3E-CFB1-422A-8F01-614CBD459922",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BCCBB90-E556-4720-8BB8-EEE7AEE593F6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "99AA308F-9F99-4361-99BC-17131197DC3D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1-4k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63366CBD-DC0A-4F77-842C-E05EA808AD32",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B3B018B-5F88-434E-86C2-BA2D099DFD2F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-16-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E44D6FD0-FB79-4951-8C01-61955B4DEAA7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-16l-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33195DA8-7870-4E0D-B1FB-1F74B9061822",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6117C474-B80D-4074-A7B4-A6B53981047E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1lw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46C9EEFE-815C-46AC-8578-D8CA6089AE85",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1s-4k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6EFEE019-F095-4245-89C6-10E1072A2E8B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1s-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2261B449-BBD2-40DC-AB65-1C58C6053732",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA479B8B-A9DC-4A58-AE54-F25F248F2303",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1w-4k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "615E1879-1645-4BC1-A75F-E6B054D53DE3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1w-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95D32DE8-5EE8-457A-BCE6-426E8E299725",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1wb-4g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2EAB9908-E7B3-4326-99E4-3250055A48A9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1wb-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7381F37B-28A3-4CF4-A7F8-B055A5030BB4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1wbs-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B542903-8E73-4FE5-A5E6-4E32324434F3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-2-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C182396A-252F-4C53-BA71-F9F4D8611E98",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9CE953F-6D7E-4C39-A678-DF50963FBB11",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-4-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14691D7F-00AD-44EB-A039-986C8BD1EB9D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-4s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "191DE899-5F31-4F9D-8994-07A628250262",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-4s-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86BDD6F5-C2F8-456D-BEB9-EA9D7978511C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-8-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A226DEE-F7BB-4B17-9955-16E2A7367BB6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-8l-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40B2DC48-1442-441E-B31C-D6FCFF7739E0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-8s-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFC976D3-ED77-48C3-B0BF-45A5A9632324",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhse265-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D85ED04-7865-4E83-8821-2A572DD99718",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25645C33-B714-4590-AABE-3F70C8281597",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60379E33-5223-4BA2-8D8B-82279170EC7E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-16l-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F654B4D-511C-4EA3-B4B6-2F1723331807",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76FB5B9D-85FB-42A1-A842-3B249898E32A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1l-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "466BBB89-98D0-473B-9EFE-A1E9A24BFCAD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1l-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E08B012C-6AF8-438F-B3D7-50FCFCB240CF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1lw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60C050DF-C096-44A0-9990-FE31F92CE0BB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1w-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8444D38-2B6B-467D-B6CE-EDA526F6C461",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1wb-4g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "407CD871-F878-4354-A9A5-FDA12C8902E7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1wb-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2780373-207F-45EB-98CA-78D080C78963",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1wb-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46EC75C6-7A52-4E67-9D2D-BE77D88882C6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-2-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0AD74A9D-5A22-4959-825D-4B334FECF820",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-4-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0AB5D9AE-B2CE-469D-8A74-EC7B8707CE23",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-4l-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC802BF6-799A-47C6-AE20-4309031DD27E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-8-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A4C5C5A-C0C1-459C-9D4B-F5D55479B446",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uve265-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB1E5C59-6C6E-446D-B2E4-81CB996082B8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uve265-1w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ECA9B1FC-728C-4DCD-963B-92BC4F37188B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on URayTech IPTV/H.264/H.265 video encoders through 1.97. Attackers can log in as root via the password that is hard-coded in the executable file."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema en los codificadores de video URayTech IPTV/H.264/H.265 versiones hasta 1.97.\u0026#xa0;Unos atacantes pueden iniciar sesi\u00f3n como root por medio de la contrase\u00f1a que est\u00e1 embebida en el archivo ejecutable"
}
],
"id": "CVE-2020-24218",
"lastModified": "2024-11-21T05:14:30.920",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-10-06T14:15:12.400",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.kb.cert.org/vuls/id/896979"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-798"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2020-24219
Vulnerability from fkie_nvd - Published: 2020-10-06 14:15 - Updated: 2024-11-21 05:14
Severity ?
Summary
An issue was discovered on URayTech IPTV/H.264/H.265 video encoders through 1.97. Attackers can send crafted unauthenticated HTTP requests to exploit path traversal and pattern-matching programming flaws, and retrieve any file from the device's file system, including the configuration file with the cleartext administrative password.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://packetstormsecurity.com/files/159595/HiSilicon-Video-Encoder-1.97-File-Disclosure-Path-Traversal.html | Exploit, Third Party Advisory, VDB Entry | |
| cve@mitre.org | https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/ | Exploit, Third Party Advisory | |
| cve@mitre.org | https://www.kb.cert.org/vuls/id/896979 | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/159595/HiSilicon-Video-Encoder-1.97-File-Disclosure-Path-Traversal.html | Exploit, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/ | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/896979 | Third Party Advisory, US Government Resource |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:szuray:iptv\\/h.264_video_encoder_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A715A089-5F76-4B05-9D27-ECF926B29BCD",
"versionEndIncluding": "1.97",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:szuray:uaioe264-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6772748B-DB2F-4125-BC8E-0DCCDFED5F0C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uce264-1-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A9AE7634-FFF7-4AE8-98D5-067B28DD96D6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uce264-1wb-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E0E73A8-C4E7-4C05-803F-912F4E21270F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uce264-4-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBACB14A-712C-4DE0-A9BD-1BF2F6816FE4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uce264-8-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF1E322A-DFD5-4D69-8A15-8BA5139A9778",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhae264-16:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09FC49AC-7F1C-4E34-8177-08E56355818B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB155809-04A8-43D7-BC84-13EFF98366B9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-16p32:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7E94025-4A64-4CAA-BA50-9125E1FC4AE3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-1p2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D9014E7-CC03-4C8A-9843-F9FA07688D1B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-1p2-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C31A218C-B38B-42F2-843A-4BE90E77CFF5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-1s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "881936E0-4039-4F9C-94CD-14F78AB410F9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-1w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B727B793-08CD-4C52-84DE-EDA328E417F0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-1ws:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4EB82D6-F526-401B-9EFB-3EA901C08F67",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-4p8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA84AFBF-4A0D-4D25-A49C-E2EAAD6BF125",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1-4k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF980787-641D-446D-AA1D-743F01F35990",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-16:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC4811B8-C8F0-4B82-BA29-EDBFF5A8F757",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-16l-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7202172A-EF50-4BF0-ACFF-6E46D6461F03",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-16s-2u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CEC5476D-C310-483A-BE8A-92339449B9CA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28A40A8D-FE09-427C-B6EB-69C171F0D893",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1l-4k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C1B9FAB-7259-44C6-B847-31D41A919CC0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1lw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "604607A9-316B-491A-BF05-25A290ACC000",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A58748D-5CE3-4D4E-ADAE-01686CA6179A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1s-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F077FD0E-CADB-4D91-B3EC-C88E3210DC7C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1w-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7968808C-37EF-47A6-A676-2C355834CBE1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1wb-4g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8E5E944-7CDA-4945-97EB-3BE6AD52FABA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1wb-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "962EAD68-5CA1-4467-A2DA-8E6F04EFCB54",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1wbs-2b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A680278C-0B4F-4693-8DE0-07276B014B34",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1wbs-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46CE60FE-EAD2-4D22-A353-C520510ED39E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1ws-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CFAB7E7C-EE61-4210-9798-55E76248C054",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-2-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B4609D6-3CD7-4EE7-9B0B-4F3137481118",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61011F2F-4DFA-457E-8748-9CD69541F094",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-4-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D0D914D-4493-4B22-B865-267F0BC6AB1B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-4l-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C54D0860-2377-431B-9B2D-1994955194DE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FD70522-EEC0-446B-9D79-504E218459FF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-8-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "208AAB27-2650-4301-A7AE-82E2C0965C09",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-8l-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85CAA5AB-FF37-4D6B-957C-A030928D5AC7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-8s-2u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "639D6035-DC3C-46F4-9B37-65DCF34D222A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-16-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "647F1835-8012-47C9-9B6D-A596EB534B7A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-1l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7FA66B0-5442-4300-AD4D-593F87024E5E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-1l-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8962B531-7224-4F8C-89C9-3A77D45BEC8F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-1l-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10ED0FBA-AE37-4147-B82B-76B2A9B50133",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-1lw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F05BD245-85DD-4C2C-ACD9-B34A3D909785",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-1wb-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83C2D275-06A6-4D7B-89E4-89B332CED051",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-4l-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EDA97F59-C447-4B2E-990A-4549E2E81CAD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-8-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6D4D394-EA33-41E1-91D2-BB38FEBF165F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uve264-1l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B70B884-1671-4E9A-93F1-8BD18BB4C0B5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uve264-1lw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98CB39B7-4958-4492-B756-658385213BA9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:szuray:iptv\\/h.265_video_encoder_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9B8BC95B-B460-493F-B936-9D17E3DC3422",
"versionEndIncluding": "1.97",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:szuray:uaioe265-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E2650DF-89F0-4AD6-B7FE-FD3BDE3D2B17",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhae265-1-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F08B9C9-E5D8-4C7C-A887-99295D60A212",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhae265-1wb-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3A44F97-E862-4F58-92D1-EAA294153D95",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhae265-4-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86C44E3E-CFB1-422A-8F01-614CBD459922",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BCCBB90-E556-4720-8BB8-EEE7AEE593F6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "99AA308F-9F99-4361-99BC-17131197DC3D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1-4k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63366CBD-DC0A-4F77-842C-E05EA808AD32",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B3B018B-5F88-434E-86C2-BA2D099DFD2F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-16-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E44D6FD0-FB79-4951-8C01-61955B4DEAA7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-16l-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33195DA8-7870-4E0D-B1FB-1F74B9061822",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6117C474-B80D-4074-A7B4-A6B53981047E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1lw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46C9EEFE-815C-46AC-8578-D8CA6089AE85",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1s-4k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6EFEE019-F095-4245-89C6-10E1072A2E8B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1s-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2261B449-BBD2-40DC-AB65-1C58C6053732",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA479B8B-A9DC-4A58-AE54-F25F248F2303",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1w-4k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "615E1879-1645-4BC1-A75F-E6B054D53DE3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1w-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95D32DE8-5EE8-457A-BCE6-426E8E299725",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1wb-4g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2EAB9908-E7B3-4326-99E4-3250055A48A9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1wb-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7381F37B-28A3-4CF4-A7F8-B055A5030BB4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1wbs-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B542903-8E73-4FE5-A5E6-4E32324434F3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-2-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C182396A-252F-4C53-BA71-F9F4D8611E98",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9CE953F-6D7E-4C39-A678-DF50963FBB11",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-4-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14691D7F-00AD-44EB-A039-986C8BD1EB9D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-4s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "191DE899-5F31-4F9D-8994-07A628250262",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-4s-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86BDD6F5-C2F8-456D-BEB9-EA9D7978511C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-8-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A226DEE-F7BB-4B17-9955-16E2A7367BB6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-8l-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40B2DC48-1442-441E-B31C-D6FCFF7739E0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-8s-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFC976D3-ED77-48C3-B0BF-45A5A9632324",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhse265-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D85ED04-7865-4E83-8821-2A572DD99718",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25645C33-B714-4590-AABE-3F70C8281597",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60379E33-5223-4BA2-8D8B-82279170EC7E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-16l-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F654B4D-511C-4EA3-B4B6-2F1723331807",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76FB5B9D-85FB-42A1-A842-3B249898E32A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1l-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "466BBB89-98D0-473B-9EFE-A1E9A24BFCAD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1l-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E08B012C-6AF8-438F-B3D7-50FCFCB240CF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1lw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60C050DF-C096-44A0-9990-FE31F92CE0BB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1w-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8444D38-2B6B-467D-B6CE-EDA526F6C461",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1wb-4g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "407CD871-F878-4354-A9A5-FDA12C8902E7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1wb-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2780373-207F-45EB-98CA-78D080C78963",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1wb-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46EC75C6-7A52-4E67-9D2D-BE77D88882C6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-2-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0AD74A9D-5A22-4959-825D-4B334FECF820",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-4-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0AB5D9AE-B2CE-469D-8A74-EC7B8707CE23",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-4l-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC802BF6-799A-47C6-AE20-4309031DD27E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-8-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A4C5C5A-C0C1-459C-9D4B-F5D55479B446",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uve265-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB1E5C59-6C6E-446D-B2E4-81CB996082B8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uve265-1w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ECA9B1FC-728C-4DCD-963B-92BC4F37188B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on URayTech IPTV/H.264/H.265 video encoders through 1.97. Attackers can send crafted unauthenticated HTTP requests to exploit path traversal and pattern-matching programming flaws, and retrieve any file from the device\u0027s file system, including the configuration file with the cleartext administrative password."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema en los codificadores de video URayTech IPTV/H.264/H.265 versiones hasta 1.97.\u0026#xa0;Unos atacantes pueden enviar una petici\u00f3n HTTP no autenticada dise\u00f1ada para explotar un salto de ruta y fallos de programaci\u00f3n de coincidencia de patrones, y recuperar cualquier archivo del sistema de archivos del dispositivo, incluyendo el archivo de configuraci\u00f3n con la contrase\u00f1a administrativa en texto sin cifrar"
}
],
"id": "CVE-2020-24219",
"lastModified": "2024-11-21T05:14:31.080",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-10-06T14:15:12.463",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/159595/HiSilicon-Video-Encoder-1.97-File-Disclosure-Path-Traversal.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/159595/HiSilicon-Video-Encoder-1.97-File-Disclosure-Path-Traversal.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.kb.cert.org/vuls/id/896979"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2020-24217
Vulnerability from fkie_nvd - Published: 2020-10-06 14:15 - Updated: 2024-11-21 05:14
Severity ?
Summary
An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. The file-upload endpoint does not enforce authentication. Attackers can send an unauthenticated HTTP request to upload a custom firmware component, possibly in conjunction with command injection, to achieve arbitrary code execution.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:szuray:iptv\\/h.264_video_encoder_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96950D0B-9D3C-432F-B1DC-C7E42409F92E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:szuray:uaioe264-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6772748B-DB2F-4125-BC8E-0DCCDFED5F0C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uce264-1-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A9AE7634-FFF7-4AE8-98D5-067B28DD96D6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uce264-1wb-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E0E73A8-C4E7-4C05-803F-912F4E21270F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uce264-4-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBACB14A-712C-4DE0-A9BD-1BF2F6816FE4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uce264-8-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF1E322A-DFD5-4D69-8A15-8BA5139A9778",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhae264-16:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09FC49AC-7F1C-4E34-8177-08E56355818B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB155809-04A8-43D7-BC84-13EFF98366B9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-16p32:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7E94025-4A64-4CAA-BA50-9125E1FC4AE3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-1p2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D9014E7-CC03-4C8A-9843-F9FA07688D1B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-1p2-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C31A218C-B38B-42F2-843A-4BE90E77CFF5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-1s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "881936E0-4039-4F9C-94CD-14F78AB410F9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-1w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B727B793-08CD-4C52-84DE-EDA328E417F0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-1ws:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4EB82D6-F526-401B-9EFB-3EA901C08F67",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-4p8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA84AFBF-4A0D-4D25-A49C-E2EAAD6BF125",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1-4k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF980787-641D-446D-AA1D-743F01F35990",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-16:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC4811B8-C8F0-4B82-BA29-EDBFF5A8F757",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-16l-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7202172A-EF50-4BF0-ACFF-6E46D6461F03",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-16s-2u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CEC5476D-C310-483A-BE8A-92339449B9CA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28A40A8D-FE09-427C-B6EB-69C171F0D893",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1l-4k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C1B9FAB-7259-44C6-B847-31D41A919CC0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1lw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "604607A9-316B-491A-BF05-25A290ACC000",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A58748D-5CE3-4D4E-ADAE-01686CA6179A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1s-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F077FD0E-CADB-4D91-B3EC-C88E3210DC7C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1w-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7968808C-37EF-47A6-A676-2C355834CBE1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1wb-4g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8E5E944-7CDA-4945-97EB-3BE6AD52FABA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1wb-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "962EAD68-5CA1-4467-A2DA-8E6F04EFCB54",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1wbs-2b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A680278C-0B4F-4693-8DE0-07276B014B34",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1wbs-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46CE60FE-EAD2-4D22-A353-C520510ED39E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1ws-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CFAB7E7C-EE61-4210-9798-55E76248C054",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-2-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B4609D6-3CD7-4EE7-9B0B-4F3137481118",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61011F2F-4DFA-457E-8748-9CD69541F094",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-4-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D0D914D-4493-4B22-B865-267F0BC6AB1B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-4l-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C54D0860-2377-431B-9B2D-1994955194DE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FD70522-EEC0-446B-9D79-504E218459FF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-8-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "208AAB27-2650-4301-A7AE-82E2C0965C09",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-8l-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85CAA5AB-FF37-4D6B-957C-A030928D5AC7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-8s-2u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "639D6035-DC3C-46F4-9B37-65DCF34D222A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-16-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "647F1835-8012-47C9-9B6D-A596EB534B7A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-1l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7FA66B0-5442-4300-AD4D-593F87024E5E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-1l-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8962B531-7224-4F8C-89C9-3A77D45BEC8F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-1l-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10ED0FBA-AE37-4147-B82B-76B2A9B50133",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-1lw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F05BD245-85DD-4C2C-ACD9-B34A3D909785",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-1wb-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83C2D275-06A6-4D7B-89E4-89B332CED051",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-4l-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EDA97F59-C447-4B2E-990A-4549E2E81CAD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-8-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6D4D394-EA33-41E1-91D2-BB38FEBF165F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uve264-1l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B70B884-1671-4E9A-93F1-8BD18BB4C0B5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uve264-1lw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98CB39B7-4958-4492-B756-658385213BA9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:szuray:iptv\\/h.265_video_encoder_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E3E17D32-939F-47DF-B6A9-018A5BA00E4F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:szuray:uaioe265-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E2650DF-89F0-4AD6-B7FE-FD3BDE3D2B17",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhae265-1-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F08B9C9-E5D8-4C7C-A887-99295D60A212",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhae265-1wb-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3A44F97-E862-4F58-92D1-EAA294153D95",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhae265-4-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86C44E3E-CFB1-422A-8F01-614CBD459922",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BCCBB90-E556-4720-8BB8-EEE7AEE593F6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "99AA308F-9F99-4361-99BC-17131197DC3D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1-4k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63366CBD-DC0A-4F77-842C-E05EA808AD32",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B3B018B-5F88-434E-86C2-BA2D099DFD2F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-16-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E44D6FD0-FB79-4951-8C01-61955B4DEAA7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-16l-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33195DA8-7870-4E0D-B1FB-1F74B9061822",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6117C474-B80D-4074-A7B4-A6B53981047E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1lw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46C9EEFE-815C-46AC-8578-D8CA6089AE85",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1s-4k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6EFEE019-F095-4245-89C6-10E1072A2E8B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1s-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2261B449-BBD2-40DC-AB65-1C58C6053732",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA479B8B-A9DC-4A58-AE54-F25F248F2303",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1w-4k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "615E1879-1645-4BC1-A75F-E6B054D53DE3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1w-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95D32DE8-5EE8-457A-BCE6-426E8E299725",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1wb-4g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2EAB9908-E7B3-4326-99E4-3250055A48A9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1wb-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7381F37B-28A3-4CF4-A7F8-B055A5030BB4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1wbs-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B542903-8E73-4FE5-A5E6-4E32324434F3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-2-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C182396A-252F-4C53-BA71-F9F4D8611E98",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9CE953F-6D7E-4C39-A678-DF50963FBB11",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-4-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14691D7F-00AD-44EB-A039-986C8BD1EB9D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-4s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "191DE899-5F31-4F9D-8994-07A628250262",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-4s-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86BDD6F5-C2F8-456D-BEB9-EA9D7978511C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-8-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A226DEE-F7BB-4B17-9955-16E2A7367BB6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-8l-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40B2DC48-1442-441E-B31C-D6FCFF7739E0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-8s-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFC976D3-ED77-48C3-B0BF-45A5A9632324",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhse265-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D85ED04-7865-4E83-8821-2A572DD99718",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25645C33-B714-4590-AABE-3F70C8281597",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60379E33-5223-4BA2-8D8B-82279170EC7E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-16l-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F654B4D-511C-4EA3-B4B6-2F1723331807",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76FB5B9D-85FB-42A1-A842-3B249898E32A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1l-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "466BBB89-98D0-473B-9EFE-A1E9A24BFCAD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1l-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E08B012C-6AF8-438F-B3D7-50FCFCB240CF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1lw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60C050DF-C096-44A0-9990-FE31F92CE0BB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1w-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8444D38-2B6B-467D-B6CE-EDA526F6C461",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1wb-4g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "407CD871-F878-4354-A9A5-FDA12C8902E7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1wb-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2780373-207F-45EB-98CA-78D080C78963",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1wb-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46EC75C6-7A52-4E67-9D2D-BE77D88882C6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-2-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0AD74A9D-5A22-4959-825D-4B334FECF820",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-4-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0AB5D9AE-B2CE-469D-8A74-EC7B8707CE23",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-4l-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC802BF6-799A-47C6-AE20-4309031DD27E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-8-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A4C5C5A-C0C1-459C-9D4B-F5D55479B446",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uve265-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB1E5C59-6C6E-446D-B2E4-81CB996082B8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uve265-1w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ECA9B1FC-728C-4DCD-963B-92BC4F37188B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:jtechdigital:h.264_iptv_encoder_1080p\\@60hz_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A83D2BA-4654-481A-A3AC-762ED2EE0FC7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:jtechdigital:h.264_iptv_encoder_1080p\\@60hz:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A25DA2BA-F7B2-4C3A-BFD5-ACF5A84AA627",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:provideoinstruments:vecaster-hd-h264_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "251AB76F-DAD8-4592-B0F4-D4D6A80D1E50",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:provideoinstruments:vecaster-hd-h264:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4982E9FC-E6FC-44BA-AEAF-FCEF7344F727",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:provideoinstruments:vecaster-hd-hevc_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6DE56A5-7EEA-44E5-85B8-F6DA8B0AC140",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:provideoinstruments:vecaster-hd-hevc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5E0315F-76F1-4FE7-B850-6588D5855AD9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:provideoinstruments:vecaster-4k-hevc_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9583183-1BCD-4AF6-ACB8-FA417C720801",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:provideoinstruments:vecaster-4k-hevc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "01492DDD-EBA7-4F49-B8D8-0E7B75B76F3E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:provideoinstruments:vecaster-hd-sdi_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2C996B50-93B2-44CD-A623-5ECC17E1C471",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:provideoinstruments:vecaster-hd-sdi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCF9D373-A23E-4FAF-8C29-09D508615A69",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. The file-upload endpoint does not enforce authentication. Attackers can send an unauthenticated HTTP request to upload a custom firmware component, possibly in conjunction with command injection, to achieve arbitrary code execution."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema en la aplicaci\u00f3n box en los codificadores de video IPTV/H.264/H.265 basados ??en HiSilicon. El endpoint de carga de archivos no aplica autenticaci\u00f3n.\u0026#xa0;Unos atacantes pueden enviar una petici\u00f3n HTTP no autenticada para cargar un componente de firmware personalizado, posiblemente junto con una inyecci\u00f3n de comandos, para lograr una ejecuci\u00f3n de c\u00f3digo arbitraria"
}
],
"id": "CVE-2020-24217",
"lastModified": "2024-11-21T05:14:30.763",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-10-06T14:15:12.337",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/159597/HiSilicon-Video-Encoder-Command-Injection.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/159599/HiSilicon-Video-Encoder-Malicious-Firmware-Code-Execution.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/159597/HiSilicon-Video-Encoder-Command-Injection.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/159599/HiSilicon-Video-Encoder-Malicious-Firmware-Code-Execution.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.kb.cert.org/vuls/id/896979"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-306"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2020-24216
Vulnerability from fkie_nvd - Published: 2020-10-06 14:15 - Updated: 2024-11-21 05:14
Severity ?
Summary
An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. When the administrator configures a secret URL for RTSP streaming, the stream is still available via its default name such as /0. Unauthenticated attackers can view video streams that are meant to be private.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/ | Exploit, Third Party Advisory | |
| cve@mitre.org | https://www.kb.cert.org/vuls/id/896979 | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/ | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/896979 | Third Party Advisory, US Government Resource |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:szuray:iptv\\/h.264_video_encoder_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96950D0B-9D3C-432F-B1DC-C7E42409F92E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:szuray:uaioe264-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6772748B-DB2F-4125-BC8E-0DCCDFED5F0C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uce264-1-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A9AE7634-FFF7-4AE8-98D5-067B28DD96D6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uce264-1wb-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E0E73A8-C4E7-4C05-803F-912F4E21270F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uce264-4-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBACB14A-712C-4DE0-A9BD-1BF2F6816FE4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uce264-8-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF1E322A-DFD5-4D69-8A15-8BA5139A9778",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhae264-16:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09FC49AC-7F1C-4E34-8177-08E56355818B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB155809-04A8-43D7-BC84-13EFF98366B9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-16p32:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7E94025-4A64-4CAA-BA50-9125E1FC4AE3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-1p2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D9014E7-CC03-4C8A-9843-F9FA07688D1B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-1p2-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C31A218C-B38B-42F2-843A-4BE90E77CFF5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-1s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "881936E0-4039-4F9C-94CD-14F78AB410F9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-1w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B727B793-08CD-4C52-84DE-EDA328E417F0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-1ws:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4EB82D6-F526-401B-9EFB-3EA901C08F67",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-4p8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA84AFBF-4A0D-4D25-A49C-E2EAAD6BF125",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1-4k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF980787-641D-446D-AA1D-743F01F35990",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-16:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC4811B8-C8F0-4B82-BA29-EDBFF5A8F757",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-16l-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7202172A-EF50-4BF0-ACFF-6E46D6461F03",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-16s-2u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CEC5476D-C310-483A-BE8A-92339449B9CA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28A40A8D-FE09-427C-B6EB-69C171F0D893",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1l-4k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C1B9FAB-7259-44C6-B847-31D41A919CC0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1lw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "604607A9-316B-491A-BF05-25A290ACC000",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A58748D-5CE3-4D4E-ADAE-01686CA6179A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1s-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F077FD0E-CADB-4D91-B3EC-C88E3210DC7C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1w-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7968808C-37EF-47A6-A676-2C355834CBE1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1wb-4g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8E5E944-7CDA-4945-97EB-3BE6AD52FABA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1wb-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "962EAD68-5CA1-4467-A2DA-8E6F04EFCB54",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1wbs-2b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A680278C-0B4F-4693-8DE0-07276B014B34",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1wbs-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46CE60FE-EAD2-4D22-A353-C520510ED39E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1ws-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CFAB7E7C-EE61-4210-9798-55E76248C054",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-2-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B4609D6-3CD7-4EE7-9B0B-4F3137481118",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61011F2F-4DFA-457E-8748-9CD69541F094",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-4-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D0D914D-4493-4B22-B865-267F0BC6AB1B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-4l-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C54D0860-2377-431B-9B2D-1994955194DE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FD70522-EEC0-446B-9D79-504E218459FF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-8-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "208AAB27-2650-4301-A7AE-82E2C0965C09",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-8l-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85CAA5AB-FF37-4D6B-957C-A030928D5AC7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-8s-2u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "639D6035-DC3C-46F4-9B37-65DCF34D222A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-16-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "647F1835-8012-47C9-9B6D-A596EB534B7A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-1l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7FA66B0-5442-4300-AD4D-593F87024E5E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-1l-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8962B531-7224-4F8C-89C9-3A77D45BEC8F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-1l-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10ED0FBA-AE37-4147-B82B-76B2A9B50133",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-1lw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F05BD245-85DD-4C2C-ACD9-B34A3D909785",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-1wb-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83C2D275-06A6-4D7B-89E4-89B332CED051",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-4l-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EDA97F59-C447-4B2E-990A-4549E2E81CAD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-8-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6D4D394-EA33-41E1-91D2-BB38FEBF165F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uve264-1l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B70B884-1671-4E9A-93F1-8BD18BB4C0B5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uve264-1lw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98CB39B7-4958-4492-B756-658385213BA9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:szuray:iptv\\/h.265_video_encoder_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E3E17D32-939F-47DF-B6A9-018A5BA00E4F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:szuray:uaioe265-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E2650DF-89F0-4AD6-B7FE-FD3BDE3D2B17",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhae265-1-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F08B9C9-E5D8-4C7C-A887-99295D60A212",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhae265-1wb-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3A44F97-E862-4F58-92D1-EAA294153D95",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhae265-4-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86C44E3E-CFB1-422A-8F01-614CBD459922",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BCCBB90-E556-4720-8BB8-EEE7AEE593F6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "99AA308F-9F99-4361-99BC-17131197DC3D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1-4k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63366CBD-DC0A-4F77-842C-E05EA808AD32",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B3B018B-5F88-434E-86C2-BA2D099DFD2F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-16-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E44D6FD0-FB79-4951-8C01-61955B4DEAA7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-16l-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33195DA8-7870-4E0D-B1FB-1F74B9061822",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6117C474-B80D-4074-A7B4-A6B53981047E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1lw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46C9EEFE-815C-46AC-8578-D8CA6089AE85",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1s-4k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6EFEE019-F095-4245-89C6-10E1072A2E8B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1s-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2261B449-BBD2-40DC-AB65-1C58C6053732",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA479B8B-A9DC-4A58-AE54-F25F248F2303",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1w-4k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "615E1879-1645-4BC1-A75F-E6B054D53DE3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1w-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95D32DE8-5EE8-457A-BCE6-426E8E299725",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1wb-4g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2EAB9908-E7B3-4326-99E4-3250055A48A9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1wb-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7381F37B-28A3-4CF4-A7F8-B055A5030BB4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1wbs-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B542903-8E73-4FE5-A5E6-4E32324434F3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-2-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C182396A-252F-4C53-BA71-F9F4D8611E98",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9CE953F-6D7E-4C39-A678-DF50963FBB11",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-4-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14691D7F-00AD-44EB-A039-986C8BD1EB9D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-4s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "191DE899-5F31-4F9D-8994-07A628250262",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-4s-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86BDD6F5-C2F8-456D-BEB9-EA9D7978511C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-8-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A226DEE-F7BB-4B17-9955-16E2A7367BB6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-8l-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40B2DC48-1442-441E-B31C-D6FCFF7739E0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-8s-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFC976D3-ED77-48C3-B0BF-45A5A9632324",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhse265-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D85ED04-7865-4E83-8821-2A572DD99718",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25645C33-B714-4590-AABE-3F70C8281597",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60379E33-5223-4BA2-8D8B-82279170EC7E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-16l-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F654B4D-511C-4EA3-B4B6-2F1723331807",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76FB5B9D-85FB-42A1-A842-3B249898E32A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1l-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "466BBB89-98D0-473B-9EFE-A1E9A24BFCAD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1l-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E08B012C-6AF8-438F-B3D7-50FCFCB240CF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1lw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60C050DF-C096-44A0-9990-FE31F92CE0BB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1w-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8444D38-2B6B-467D-B6CE-EDA526F6C461",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1wb-4g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "407CD871-F878-4354-A9A5-FDA12C8902E7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1wb-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2780373-207F-45EB-98CA-78D080C78963",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1wb-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46EC75C6-7A52-4E67-9D2D-BE77D88882C6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-2-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0AD74A9D-5A22-4959-825D-4B334FECF820",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-4-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0AB5D9AE-B2CE-469D-8A74-EC7B8707CE23",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-4l-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC802BF6-799A-47C6-AE20-4309031DD27E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-8-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A4C5C5A-C0C1-459C-9D4B-F5D55479B446",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uve265-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB1E5C59-6C6E-446D-B2E4-81CB996082B8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uve265-1w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ECA9B1FC-728C-4DCD-963B-92BC4F37188B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:jtechdigital:h.264_iptv_encoder_1080p\\@60hz_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A83D2BA-4654-481A-A3AC-762ED2EE0FC7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:jtechdigital:h.264_iptv_encoder_1080p\\@60hz:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A25DA2BA-F7B2-4C3A-BFD5-ACF5A84AA627",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:provideoinstruments:vecaster-hd-h264_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "251AB76F-DAD8-4592-B0F4-D4D6A80D1E50",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:provideoinstruments:vecaster-hd-h264:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4982E9FC-E6FC-44BA-AEAF-FCEF7344F727",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:provideoinstruments:vecaster-hd-hevc_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6DE56A5-7EEA-44E5-85B8-F6DA8B0AC140",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:provideoinstruments:vecaster-hd-hevc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5E0315F-76F1-4FE7-B850-6588D5855AD9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:provideoinstruments:vecaster-4k-hevc_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9583183-1BCD-4AF6-ACB8-FA417C720801",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:provideoinstruments:vecaster-4k-hevc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "01492DDD-EBA7-4F49-B8D8-0E7B75B76F3E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:provideoinstruments:vecaster-hd-sdi_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2C996B50-93B2-44CD-A623-5ECC17E1C471",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:provideoinstruments:vecaster-hd-sdi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCF9D373-A23E-4FAF-8C29-09D508615A69",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. When the administrator configures a secret URL for RTSP streaming, the stream is still available via its default name such as /0. Unauthenticated attackers can view video streams that are meant to be private."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema en la aplicaci\u00f3n box en los codificadores de video IPTV/H.264/H.265 basados ??en HiSilicon.\u0026#xa0;Cuando el administrador configura una URL secreta para la transmisi\u00f3n RTSP, la transmisi\u00f3n a\u00fan est\u00e1 disponible por medio de su nombre predeterminado, como /0.\u0026#xa0;Unos atacantes no autenticados pueden visualizar transmisiones de video que est\u00e1n destinadas a ser privadas"
}
],
"id": "CVE-2020-24216",
"lastModified": "2024-11-21T05:14:30.603",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-10-06T14:15:12.277",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.kb.cert.org/vuls/id/896979"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2020-24214
Vulnerability from fkie_nvd - Published: 2020-10-06 13:15 - Updated: 2024-11-21 05:14
Severity ?
Summary
An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. Attackers can send a crafted unauthenticated RTSP request to cause a buffer overflow and application crash. The device will not be able to perform its main purpose of video encoding and streaming for up to a minute, until it automatically reboots. Attackers can send malicious requests once a minute, effectively disabling the device.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://packetstormsecurity.com/files/159605/HiSilicon-Video-Encoder-Buffer-Overflow-Denial-Of-Service.html | Exploit, Third Party Advisory | |
| cve@mitre.org | https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/ | Exploit, Third Party Advisory | |
| cve@mitre.org | https://www.kb.cert.org/vuls/id/896979 | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/159605/HiSilicon-Video-Encoder-Buffer-Overflow-Denial-Of-Service.html | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/ | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/896979 | Third Party Advisory, US Government Resource |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:szuray:iptv\\/h.264_video_encoder_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96950D0B-9D3C-432F-B1DC-C7E42409F92E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:szuray:uaioe264-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6772748B-DB2F-4125-BC8E-0DCCDFED5F0C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uce264-1-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A9AE7634-FFF7-4AE8-98D5-067B28DD96D6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uce264-1wb-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E0E73A8-C4E7-4C05-803F-912F4E21270F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uce264-4-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBACB14A-712C-4DE0-A9BD-1BF2F6816FE4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uce264-8-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF1E322A-DFD5-4D69-8A15-8BA5139A9778",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhae264-16:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09FC49AC-7F1C-4E34-8177-08E56355818B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB155809-04A8-43D7-BC84-13EFF98366B9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-16p32:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7E94025-4A64-4CAA-BA50-9125E1FC4AE3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-1p2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D9014E7-CC03-4C8A-9843-F9FA07688D1B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-1p2-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C31A218C-B38B-42F2-843A-4BE90E77CFF5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-1s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "881936E0-4039-4F9C-94CD-14F78AB410F9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-1w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B727B793-08CD-4C52-84DE-EDA328E417F0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-1ws:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4EB82D6-F526-401B-9EFB-3EA901C08F67",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-4p8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA84AFBF-4A0D-4D25-A49C-E2EAAD6BF125",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1-4k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF980787-641D-446D-AA1D-743F01F35990",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-16:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC4811B8-C8F0-4B82-BA29-EDBFF5A8F757",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-16l-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7202172A-EF50-4BF0-ACFF-6E46D6461F03",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-16s-2u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CEC5476D-C310-483A-BE8A-92339449B9CA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28A40A8D-FE09-427C-B6EB-69C171F0D893",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1l-4k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C1B9FAB-7259-44C6-B847-31D41A919CC0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1lw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "604607A9-316B-491A-BF05-25A290ACC000",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A58748D-5CE3-4D4E-ADAE-01686CA6179A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1s-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F077FD0E-CADB-4D91-B3EC-C88E3210DC7C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1w-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7968808C-37EF-47A6-A676-2C355834CBE1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1wb-4g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8E5E944-7CDA-4945-97EB-3BE6AD52FABA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1wb-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "962EAD68-5CA1-4467-A2DA-8E6F04EFCB54",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1wbs-2b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A680278C-0B4F-4693-8DE0-07276B014B34",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1wbs-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46CE60FE-EAD2-4D22-A353-C520510ED39E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1ws-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CFAB7E7C-EE61-4210-9798-55E76248C054",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-2-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B4609D6-3CD7-4EE7-9B0B-4F3137481118",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61011F2F-4DFA-457E-8748-9CD69541F094",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-4-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D0D914D-4493-4B22-B865-267F0BC6AB1B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-4l-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C54D0860-2377-431B-9B2D-1994955194DE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FD70522-EEC0-446B-9D79-504E218459FF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-8-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "208AAB27-2650-4301-A7AE-82E2C0965C09",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-8l-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85CAA5AB-FF37-4D6B-957C-A030928D5AC7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-8s-2u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "639D6035-DC3C-46F4-9B37-65DCF34D222A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-16-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "647F1835-8012-47C9-9B6D-A596EB534B7A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-1l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7FA66B0-5442-4300-AD4D-593F87024E5E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-1l-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8962B531-7224-4F8C-89C9-3A77D45BEC8F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-1l-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10ED0FBA-AE37-4147-B82B-76B2A9B50133",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-1lw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F05BD245-85DD-4C2C-ACD9-B34A3D909785",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-1wb-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83C2D275-06A6-4D7B-89E4-89B332CED051",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-4l-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EDA97F59-C447-4B2E-990A-4549E2E81CAD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-8-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6D4D394-EA33-41E1-91D2-BB38FEBF165F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uve264-1l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B70B884-1671-4E9A-93F1-8BD18BB4C0B5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uve264-1lw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98CB39B7-4958-4492-B756-658385213BA9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:szuray:iptv\\/h.265_video_encoder_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E3E17D32-939F-47DF-B6A9-018A5BA00E4F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:szuray:uaioe265-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E2650DF-89F0-4AD6-B7FE-FD3BDE3D2B17",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhae265-1-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F08B9C9-E5D8-4C7C-A887-99295D60A212",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhae265-1wb-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3A44F97-E862-4F58-92D1-EAA294153D95",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhae265-4-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86C44E3E-CFB1-422A-8F01-614CBD459922",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BCCBB90-E556-4720-8BB8-EEE7AEE593F6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "99AA308F-9F99-4361-99BC-17131197DC3D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1-4k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63366CBD-DC0A-4F77-842C-E05EA808AD32",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B3B018B-5F88-434E-86C2-BA2D099DFD2F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-16-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E44D6FD0-FB79-4951-8C01-61955B4DEAA7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-16l-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33195DA8-7870-4E0D-B1FB-1F74B9061822",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6117C474-B80D-4074-A7B4-A6B53981047E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1lw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46C9EEFE-815C-46AC-8578-D8CA6089AE85",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1s-4k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6EFEE019-F095-4245-89C6-10E1072A2E8B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1s-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2261B449-BBD2-40DC-AB65-1C58C6053732",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA479B8B-A9DC-4A58-AE54-F25F248F2303",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1w-4k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "615E1879-1645-4BC1-A75F-E6B054D53DE3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1w-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95D32DE8-5EE8-457A-BCE6-426E8E299725",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1wb-4g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2EAB9908-E7B3-4326-99E4-3250055A48A9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1wb-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7381F37B-28A3-4CF4-A7F8-B055A5030BB4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1wbs-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B542903-8E73-4FE5-A5E6-4E32324434F3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-2-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C182396A-252F-4C53-BA71-F9F4D8611E98",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9CE953F-6D7E-4C39-A678-DF50963FBB11",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-4-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14691D7F-00AD-44EB-A039-986C8BD1EB9D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-4s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "191DE899-5F31-4F9D-8994-07A628250262",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-4s-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86BDD6F5-C2F8-456D-BEB9-EA9D7978511C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-8-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A226DEE-F7BB-4B17-9955-16E2A7367BB6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-8l-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40B2DC48-1442-441E-B31C-D6FCFF7739E0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-8s-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFC976D3-ED77-48C3-B0BF-45A5A9632324",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhse265-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D85ED04-7865-4E83-8821-2A572DD99718",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25645C33-B714-4590-AABE-3F70C8281597",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60379E33-5223-4BA2-8D8B-82279170EC7E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-16l-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F654B4D-511C-4EA3-B4B6-2F1723331807",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76FB5B9D-85FB-42A1-A842-3B249898E32A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1l-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "466BBB89-98D0-473B-9EFE-A1E9A24BFCAD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1l-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E08B012C-6AF8-438F-B3D7-50FCFCB240CF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1lw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60C050DF-C096-44A0-9990-FE31F92CE0BB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1w-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8444D38-2B6B-467D-B6CE-EDA526F6C461",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1wb-4g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "407CD871-F878-4354-A9A5-FDA12C8902E7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1wb-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2780373-207F-45EB-98CA-78D080C78963",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1wb-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46EC75C6-7A52-4E67-9D2D-BE77D88882C6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-2-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0AD74A9D-5A22-4959-825D-4B334FECF820",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-4-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0AB5D9AE-B2CE-469D-8A74-EC7B8707CE23",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-4l-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC802BF6-799A-47C6-AE20-4309031DD27E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-8-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A4C5C5A-C0C1-459C-9D4B-F5D55479B446",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uve265-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB1E5C59-6C6E-446D-B2E4-81CB996082B8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uve265-1w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ECA9B1FC-728C-4DCD-963B-92BC4F37188B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:jtechdigital:h.264_iptv_encoder_1080p\\@60hz_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A83D2BA-4654-481A-A3AC-762ED2EE0FC7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:jtechdigital:h.264_iptv_encoder_1080p\\@60hz:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A25DA2BA-F7B2-4C3A-BFD5-ACF5A84AA627",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:provideoinstruments:vecaster-hd-h264_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "251AB76F-DAD8-4592-B0F4-D4D6A80D1E50",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:provideoinstruments:vecaster-hd-h264:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4982E9FC-E6FC-44BA-AEAF-FCEF7344F727",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:provideoinstruments:vecaster-hd-hevc_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6DE56A5-7EEA-44E5-85B8-F6DA8B0AC140",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:provideoinstruments:vecaster-hd-hevc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5E0315F-76F1-4FE7-B850-6588D5855AD9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:provideoinstruments:vecaster-4k-hevc_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9583183-1BCD-4AF6-ACB8-FA417C720801",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:provideoinstruments:vecaster-4k-hevc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "01492DDD-EBA7-4F49-B8D8-0E7B75B76F3E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:provideoinstruments:vecaster-hd-sdi_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2C996B50-93B2-44CD-A623-5ECC17E1C471",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:provideoinstruments:vecaster-hd-sdi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCF9D373-A23E-4FAF-8C29-09D508615A69",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. Attackers can send a crafted unauthenticated RTSP request to cause a buffer overflow and application crash. The device will not be able to perform its main purpose of video encoding and streaming for up to a minute, until it automatically reboots. Attackers can send malicious requests once a minute, effectively disabling the device."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema en la aplicaci\u00f3n box en los codificadores de video IPTV/H.264/H.265 basados ??en HiSilicon.\u0026#xa0;Unos atacantes pueden enviar una petici\u00f3n RTSP no autenticada dise\u00f1ada para causar un desbordamiento del b\u00fafer y un bloqueo de la aplicaci\u00f3n.\u0026#xa0;El dispositivo no podr\u00e1 ser capaz de llevar a cabo su prop\u00f3sito principal de codificaci\u00f3n y transmisi\u00f3n de video por hasta un minuto, hasta que se reinicie autom\u00e1ticamente.\u0026#xa0;Unos atacantes pueden enviar peticiones maliciosas una vez por minuto, desactivando efectivamente el dispositivo"
}
],
"id": "CVE-2020-24214",
"lastModified": "2024-11-21T05:14:30.260",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-10-06T13:15:13.637",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http://packetstormsecurity.com/files/159605/HiSilicon-Video-Encoder-Buffer-Overflow-Denial-Of-Service.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http://packetstormsecurity.com/files/159605/HiSilicon-Video-Encoder-Buffer-Overflow-Denial-Of-Service.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.kb.cert.org/vuls/id/896979"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2020-24215
Vulnerability from fkie_nvd - Published: 2020-10-06 13:15 - Updated: 2024-11-21 05:14
Severity ?
Summary
An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. Attackers can use hard-coded credentials in HTTP requests to perform any administrative task on the device including retrieving the device's configuration (with the cleartext admin password), and uploading a custom firmware update, to ultimately achieve arbitrary code execution.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://packetstormsecurity.com/files/159601/HiSilicon-Video-Encoder-Backdoor-Password.html | Exploit, Third Party Advisory | |
| cve@mitre.org | https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/ | Exploit, Third Party Advisory | |
| cve@mitre.org | https://www.kb.cert.org/vuls/id/896979 | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/159601/HiSilicon-Video-Encoder-Backdoor-Password.html | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/ | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/896979 | Third Party Advisory, US Government Resource |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:szuray:iptv\\/h.264_video_encoder_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96950D0B-9D3C-432F-B1DC-C7E42409F92E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:szuray:uaioe264-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6772748B-DB2F-4125-BC8E-0DCCDFED5F0C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uce264-1-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A9AE7634-FFF7-4AE8-98D5-067B28DD96D6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uce264-1wb-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E0E73A8-C4E7-4C05-803F-912F4E21270F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uce264-4-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBACB14A-712C-4DE0-A9BD-1BF2F6816FE4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uce264-8-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF1E322A-DFD5-4D69-8A15-8BA5139A9778",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhae264-16:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09FC49AC-7F1C-4E34-8177-08E56355818B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB155809-04A8-43D7-BC84-13EFF98366B9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-16p32:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7E94025-4A64-4CAA-BA50-9125E1FC4AE3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-1p2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D9014E7-CC03-4C8A-9843-F9FA07688D1B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-1p2-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C31A218C-B38B-42F2-843A-4BE90E77CFF5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-1s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "881936E0-4039-4F9C-94CD-14F78AB410F9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-1w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B727B793-08CD-4C52-84DE-EDA328E417F0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-1ws:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4EB82D6-F526-401B-9EFB-3EA901C08F67",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhce264-4p8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA84AFBF-4A0D-4D25-A49C-E2EAAD6BF125",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1-4k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF980787-641D-446D-AA1D-743F01F35990",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-16:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC4811B8-C8F0-4B82-BA29-EDBFF5A8F757",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-16l-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7202172A-EF50-4BF0-ACFF-6E46D6461F03",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-16s-2u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CEC5476D-C310-483A-BE8A-92339449B9CA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28A40A8D-FE09-427C-B6EB-69C171F0D893",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1l-4k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C1B9FAB-7259-44C6-B847-31D41A919CC0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1lw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "604607A9-316B-491A-BF05-25A290ACC000",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A58748D-5CE3-4D4E-ADAE-01686CA6179A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1s-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F077FD0E-CADB-4D91-B3EC-C88E3210DC7C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1w-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7968808C-37EF-47A6-A676-2C355834CBE1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1wb-4g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8E5E944-7CDA-4945-97EB-3BE6AD52FABA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1wb-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "962EAD68-5CA1-4467-A2DA-8E6F04EFCB54",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1wbs-2b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A680278C-0B4F-4693-8DE0-07276B014B34",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1wbs-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46CE60FE-EAD2-4D22-A353-C520510ED39E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-1ws-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CFAB7E7C-EE61-4210-9798-55E76248C054",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-2-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B4609D6-3CD7-4EE7-9B0B-4F3137481118",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61011F2F-4DFA-457E-8748-9CD69541F094",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-4-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D0D914D-4493-4B22-B865-267F0BC6AB1B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-4l-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C54D0860-2377-431B-9B2D-1994955194DE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FD70522-EEC0-446B-9D79-504E218459FF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-8-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "208AAB27-2650-4301-A7AE-82E2C0965C09",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-8l-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85CAA5AB-FF37-4D6B-957C-A030928D5AC7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe264-8s-2u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "639D6035-DC3C-46F4-9B37-65DCF34D222A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-16-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "647F1835-8012-47C9-9B6D-A596EB534B7A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-1l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7FA66B0-5442-4300-AD4D-593F87024E5E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-1l-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8962B531-7224-4F8C-89C9-3A77D45BEC8F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-1l-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10ED0FBA-AE37-4147-B82B-76B2A9B50133",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-1lw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F05BD245-85DD-4C2C-ACD9-B34A3D909785",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-1wb-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83C2D275-06A6-4D7B-89E4-89B332CED051",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-4l-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EDA97F59-C447-4B2E-990A-4549E2E81CAD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use264-8-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6D4D394-EA33-41E1-91D2-BB38FEBF165F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uve264-1l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B70B884-1671-4E9A-93F1-8BD18BB4C0B5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uve264-1lw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98CB39B7-4958-4492-B756-658385213BA9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:szuray:iptv\\/h.265_video_encoder_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E3E17D32-939F-47DF-B6A9-018A5BA00E4F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:szuray:uaioe265-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E2650DF-89F0-4AD6-B7FE-FD3BDE3D2B17",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhae265-1-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F08B9C9-E5D8-4C7C-A887-99295D60A212",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhae265-1wb-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3A44F97-E862-4F58-92D1-EAA294153D95",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhae265-4-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86C44E3E-CFB1-422A-8F01-614CBD459922",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BCCBB90-E556-4720-8BB8-EEE7AEE593F6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "99AA308F-9F99-4361-99BC-17131197DC3D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1-4k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63366CBD-DC0A-4F77-842C-E05EA808AD32",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B3B018B-5F88-434E-86C2-BA2D099DFD2F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-16-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E44D6FD0-FB79-4951-8C01-61955B4DEAA7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-16l-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33195DA8-7870-4E0D-B1FB-1F74B9061822",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6117C474-B80D-4074-A7B4-A6B53981047E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1lw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46C9EEFE-815C-46AC-8578-D8CA6089AE85",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1s-4k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6EFEE019-F095-4245-89C6-10E1072A2E8B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1s-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2261B449-BBD2-40DC-AB65-1C58C6053732",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA479B8B-A9DC-4A58-AE54-F25F248F2303",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1w-4k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "615E1879-1645-4BC1-A75F-E6B054D53DE3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1w-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95D32DE8-5EE8-457A-BCE6-426E8E299725",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1wb-4g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2EAB9908-E7B3-4326-99E4-3250055A48A9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1wb-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7381F37B-28A3-4CF4-A7F8-B055A5030BB4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-1wbs-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B542903-8E73-4FE5-A5E6-4E32324434F3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-2-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C182396A-252F-4C53-BA71-F9F4D8611E98",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9CE953F-6D7E-4C39-A678-DF50963FBB11",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-4-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14691D7F-00AD-44EB-A039-986C8BD1EB9D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-4s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "191DE899-5F31-4F9D-8994-07A628250262",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-4s-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86BDD6F5-C2F8-456D-BEB9-EA9D7978511C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-8-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A226DEE-F7BB-4B17-9955-16E2A7367BB6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-8l-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40B2DC48-1442-441E-B31C-D6FCFF7739E0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhe265-8s-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFC976D3-ED77-48C3-B0BF-45A5A9632324",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uhse265-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D85ED04-7865-4E83-8821-2A572DD99718",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25645C33-B714-4590-AABE-3F70C8281597",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60379E33-5223-4BA2-8D8B-82279170EC7E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-16l-3u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F654B4D-511C-4EA3-B4B6-2F1723331807",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76FB5B9D-85FB-42A1-A842-3B249898E32A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1l-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "466BBB89-98D0-473B-9EFE-A1E9A24BFCAD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1l-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E08B012C-6AF8-438F-B3D7-50FCFCB240CF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1lw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60C050DF-C096-44A0-9990-FE31F92CE0BB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1w-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8444D38-2B6B-467D-B6CE-EDA526F6C461",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1wb-4g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "407CD871-F878-4354-A9A5-FDA12C8902E7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1wb-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2780373-207F-45EB-98CA-78D080C78963",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-1wb-mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46EC75C6-7A52-4E67-9D2D-BE77D88882C6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-2-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0AD74A9D-5A22-4959-825D-4B334FECF820",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-4-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0AB5D9AE-B2CE-469D-8A74-EC7B8707CE23",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-4l-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC802BF6-799A-47C6-AE20-4309031DD27E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:use265-8-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A4C5C5A-C0C1-459C-9D4B-F5D55479B446",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uve265-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB1E5C59-6C6E-446D-B2E4-81CB996082B8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:szuray:uve265-1w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ECA9B1FC-728C-4DCD-963B-92BC4F37188B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:jtechdigital:h.264_iptv_encoder_1080p\\@60hz_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A83D2BA-4654-481A-A3AC-762ED2EE0FC7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:jtechdigital:h.264_iptv_encoder_1080p\\@60hz:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A25DA2BA-F7B2-4C3A-BFD5-ACF5A84AA627",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:provideoinstruments:vecaster-hd-h264_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "251AB76F-DAD8-4592-B0F4-D4D6A80D1E50",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:provideoinstruments:vecaster-hd-h264:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4982E9FC-E6FC-44BA-AEAF-FCEF7344F727",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:provideoinstruments:vecaster-hd-hevc_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6DE56A5-7EEA-44E5-85B8-F6DA8B0AC140",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:provideoinstruments:vecaster-hd-hevc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5E0315F-76F1-4FE7-B850-6588D5855AD9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:provideoinstruments:vecaster-4k-hevc_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9583183-1BCD-4AF6-ACB8-FA417C720801",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:provideoinstruments:vecaster-4k-hevc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "01492DDD-EBA7-4F49-B8D8-0E7B75B76F3E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:provideoinstruments:vecaster-hd-sdi_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2C996B50-93B2-44CD-A623-5ECC17E1C471",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:provideoinstruments:vecaster-hd-sdi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCF9D373-A23E-4FAF-8C29-09D508615A69",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. Attackers can use hard-coded credentials in HTTP requests to perform any administrative task on the device including retrieving the device\u0027s configuration (with the cleartext admin password), and uploading a custom firmware update, to ultimately achieve arbitrary code execution."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema en la aplicaci\u00f3n box en los codificadores de video IPTV/H.264/H.265 basados ??en HiSilicon.\u0026#xa0;Unos atacantes pueden usar credenciales embebidas en las peticiones HTTP para llevar a cabo cualquier tarea administrativa en el dispositivo, incluyendo la recuperaci\u00f3n de la configuraci\u00f3n del dispositivo (con la contrase\u00f1a de administrador en texto sin cifrar) y la carga de una actualizaci\u00f3n de firmware personalizada, para finalmente lograr una ejecuci\u00f3n de c\u00f3digo arbitrario"
}
],
"id": "CVE-2020-24215",
"lastModified": "2024-11-21T05:14:30.433",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-10-06T13:15:13.743",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http://packetstormsecurity.com/files/159601/HiSilicon-Video-Encoder-Backdoor-Password.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http://packetstormsecurity.com/files/159601/HiSilicon-Video-Encoder-Backdoor-Password.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.kb.cert.org/vuls/id/896979"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-798"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2020-24219 (GCVE-0-2020-24219)
Vulnerability from cvelistv5 – Published: 2020-10-06 13:16 – Updated: 2024-08-04 15:12
VLAI?
Summary
An issue was discovered on URayTech IPTV/H.264/H.265 video encoders through 1.97. Attackers can send crafted unauthenticated HTTP requests to exploit path traversal and pattern-matching programming flaws, and retrieve any file from the device's file system, including the configuration file with the cleartext administrative password.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T15:12:07.227Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/159595/HiSilicon-Video-Encoder-1.97-File-Disclosure-Path-Traversal.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2020-09-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on URayTech IPTV/H.264/H.265 video encoders through 1.97. Attackers can send crafted unauthenticated HTTP requests to exploit path traversal and pattern-matching programming flaws, and retrieve any file from the device\u0027s file system, including the configuration file with the cleartext administrative password."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-10-19T17:06:21",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/159595/HiSilicon-Video-Encoder-1.97-File-Disclosure-Path-Traversal.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-24219",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered on URayTech IPTV/H.264/H.265 video encoders through 1.97. Attackers can send crafted unauthenticated HTTP requests to exploit path traversal and pattern-matching programming flaws, and retrieve any file from the device\u0027s file system, including the configuration file with the cleartext administrative password."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.kb.cert.org/vuls/id/896979",
"refsource": "MISC",
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"name": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/",
"refsource": "MISC",
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
},
{
"name": "http://packetstormsecurity.com/files/159595/HiSilicon-Video-Encoder-1.97-File-Disclosure-Path-Traversal.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/159595/HiSilicon-Video-Encoder-1.97-File-Disclosure-Path-Traversal.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2020-24219",
"datePublished": "2020-10-06T13:16:05",
"dateReserved": "2020-08-13T00:00:00",
"dateUpdated": "2024-08-04T15:12:07.227Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-24218 (GCVE-0-2020-24218)
Vulnerability from cvelistv5 – Published: 2020-10-06 13:10 – Updated: 2024-08-04 15:12
VLAI?
Summary
An issue was discovered on URayTech IPTV/H.264/H.265 video encoders through 1.97. Attackers can log in as root via the password that is hard-coded in the executable file.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T15:12:08.589Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2020-09-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on URayTech IPTV/H.264/H.265 video encoders through 1.97. Attackers can log in as root via the password that is hard-coded in the executable file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-10-06T13:10:17",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-24218",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered on URayTech IPTV/H.264/H.265 video encoders through 1.97. Attackers can log in as root via the password that is hard-coded in the executable file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.kb.cert.org/vuls/id/896979",
"refsource": "MISC",
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"name": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/",
"refsource": "MISC",
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2020-24218",
"datePublished": "2020-10-06T13:10:17",
"dateReserved": "2020-08-13T00:00:00",
"dateUpdated": "2024-08-04T15:12:08.589Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-24217 (GCVE-0-2020-24217)
Vulnerability from cvelistv5 – Published: 2020-10-06 13:05 – Updated: 2024-08-04 15:12
VLAI?
Summary
An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. The file-upload endpoint does not enforce authentication. Attackers can send an unauthenticated HTTP request to upload a custom firmware component, possibly in conjunction with command injection, to achieve arbitrary code execution.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T15:12:07.203Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/159599/HiSilicon-Video-Encoder-Malicious-Firmware-Code-Execution.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/159597/HiSilicon-Video-Encoder-Command-Injection.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2020-09-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. The file-upload endpoint does not enforce authentication. Attackers can send an unauthenticated HTTP request to upload a custom firmware component, possibly in conjunction with command injection, to achieve arbitrary code execution."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-10-19T17:06:20",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/159599/HiSilicon-Video-Encoder-Malicious-Firmware-Code-Execution.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/159597/HiSilicon-Video-Encoder-Command-Injection.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-24217",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. The file-upload endpoint does not enforce authentication. Attackers can send an unauthenticated HTTP request to upload a custom firmware component, possibly in conjunction with command injection, to achieve arbitrary code execution."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.kb.cert.org/vuls/id/896979",
"refsource": "MISC",
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"name": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/",
"refsource": "MISC",
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
},
{
"name": "http://packetstormsecurity.com/files/159599/HiSilicon-Video-Encoder-Malicious-Firmware-Code-Execution.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/159599/HiSilicon-Video-Encoder-Malicious-Firmware-Code-Execution.html"
},
{
"name": "http://packetstormsecurity.com/files/159597/HiSilicon-Video-Encoder-Command-Injection.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/159597/HiSilicon-Video-Encoder-Command-Injection.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2020-24217",
"datePublished": "2020-10-06T13:05:36",
"dateReserved": "2020-08-13T00:00:00",
"dateUpdated": "2024-08-04T15:12:07.203Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-24216 (GCVE-0-2020-24216)
Vulnerability from cvelistv5 – Published: 2020-10-06 13:02 – Updated: 2024-08-04 15:12
VLAI?
Summary
An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. When the administrator configures a secret URL for RTSP streaming, the stream is still available via its default name such as /0. Unauthenticated attackers can view video streams that are meant to be private.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T15:12:08.336Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2020-09-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. When the administrator configures a secret URL for RTSP streaming, the stream is still available via its default name such as /0. Unauthenticated attackers can view video streams that are meant to be private."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-10-06T13:02:48",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-24216",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. When the administrator configures a secret URL for RTSP streaming, the stream is still available via its default name such as /0. Unauthenticated attackers can view video streams that are meant to be private."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.kb.cert.org/vuls/id/896979",
"refsource": "MISC",
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"name": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/",
"refsource": "MISC",
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2020-24216",
"datePublished": "2020-10-06T13:02:48",
"dateReserved": "2020-08-13T00:00:00",
"dateUpdated": "2024-08-04T15:12:08.336Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-24215 (GCVE-0-2020-24215)
Vulnerability from cvelistv5 – Published: 2020-10-06 13:00 – Updated: 2024-08-04 15:12
VLAI?
Summary
An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. Attackers can use hard-coded credentials in HTTP requests to perform any administrative task on the device including retrieving the device's configuration (with the cleartext admin password), and uploading a custom firmware update, to ultimately achieve arbitrary code execution.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T15:12:08.683Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/159601/HiSilicon-Video-Encoder-Backdoor-Password.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2020-09-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. Attackers can use hard-coded credentials in HTTP requests to perform any administrative task on the device including retrieving the device\u0027s configuration (with the cleartext admin password), and uploading a custom firmware update, to ultimately achieve arbitrary code execution."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-10-19T17:06:23",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/159601/HiSilicon-Video-Encoder-Backdoor-Password.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-24215",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. Attackers can use hard-coded credentials in HTTP requests to perform any administrative task on the device including retrieving the device\u0027s configuration (with the cleartext admin password), and uploading a custom firmware update, to ultimately achieve arbitrary code execution."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.kb.cert.org/vuls/id/896979",
"refsource": "MISC",
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"name": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/",
"refsource": "MISC",
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
},
{
"name": "http://packetstormsecurity.com/files/159601/HiSilicon-Video-Encoder-Backdoor-Password.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/159601/HiSilicon-Video-Encoder-Backdoor-Password.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2020-24215",
"datePublished": "2020-10-06T13:00:33",
"dateReserved": "2020-08-13T00:00:00",
"dateUpdated": "2024-08-04T15:12:08.683Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-24214 (GCVE-0-2020-24214)
Vulnerability from cvelistv5 – Published: 2020-10-06 12:58 – Updated: 2024-08-04 15:12
VLAI?
Summary
An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. Attackers can send a crafted unauthenticated RTSP request to cause a buffer overflow and application crash. The device will not be able to perform its main purpose of video encoding and streaming for up to a minute, until it automatically reboots. Attackers can send malicious requests once a minute, effectively disabling the device.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T15:12:08.326Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/159605/HiSilicon-Video-Encoder-Buffer-Overflow-Denial-Of-Service.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2020-09-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. Attackers can send a crafted unauthenticated RTSP request to cause a buffer overflow and application crash. The device will not be able to perform its main purpose of video encoding and streaming for up to a minute, until it automatically reboots. Attackers can send malicious requests once a minute, effectively disabling the device."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-10-19T17:06:21",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/159605/HiSilicon-Video-Encoder-Buffer-Overflow-Denial-Of-Service.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-24214",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. Attackers can send a crafted unauthenticated RTSP request to cause a buffer overflow and application crash. The device will not be able to perform its main purpose of video encoding and streaming for up to a minute, until it automatically reboots. Attackers can send malicious requests once a minute, effectively disabling the device."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.kb.cert.org/vuls/id/896979",
"refsource": "MISC",
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"name": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/",
"refsource": "MISC",
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
},
{
"name": "http://packetstormsecurity.com/files/159605/HiSilicon-Video-Encoder-Buffer-Overflow-Denial-Of-Service.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/159605/HiSilicon-Video-Encoder-Buffer-Overflow-Denial-Of-Service.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2020-24214",
"datePublished": "2020-10-06T12:58:05",
"dateReserved": "2020-08-13T00:00:00",
"dateUpdated": "2024-08-04T15:12:08.326Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-24219 (GCVE-0-2020-24219)
Vulnerability from nvd – Published: 2020-10-06 13:16 – Updated: 2024-08-04 15:12
VLAI?
Summary
An issue was discovered on URayTech IPTV/H.264/H.265 video encoders through 1.97. Attackers can send crafted unauthenticated HTTP requests to exploit path traversal and pattern-matching programming flaws, and retrieve any file from the device's file system, including the configuration file with the cleartext administrative password.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T15:12:07.227Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/159595/HiSilicon-Video-Encoder-1.97-File-Disclosure-Path-Traversal.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2020-09-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on URayTech IPTV/H.264/H.265 video encoders through 1.97. Attackers can send crafted unauthenticated HTTP requests to exploit path traversal and pattern-matching programming flaws, and retrieve any file from the device\u0027s file system, including the configuration file with the cleartext administrative password."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-10-19T17:06:21",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/159595/HiSilicon-Video-Encoder-1.97-File-Disclosure-Path-Traversal.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-24219",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered on URayTech IPTV/H.264/H.265 video encoders through 1.97. Attackers can send crafted unauthenticated HTTP requests to exploit path traversal and pattern-matching programming flaws, and retrieve any file from the device\u0027s file system, including the configuration file with the cleartext administrative password."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.kb.cert.org/vuls/id/896979",
"refsource": "MISC",
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"name": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/",
"refsource": "MISC",
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
},
{
"name": "http://packetstormsecurity.com/files/159595/HiSilicon-Video-Encoder-1.97-File-Disclosure-Path-Traversal.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/159595/HiSilicon-Video-Encoder-1.97-File-Disclosure-Path-Traversal.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2020-24219",
"datePublished": "2020-10-06T13:16:05",
"dateReserved": "2020-08-13T00:00:00",
"dateUpdated": "2024-08-04T15:12:07.227Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-24218 (GCVE-0-2020-24218)
Vulnerability from nvd – Published: 2020-10-06 13:10 – Updated: 2024-08-04 15:12
VLAI?
Summary
An issue was discovered on URayTech IPTV/H.264/H.265 video encoders through 1.97. Attackers can log in as root via the password that is hard-coded in the executable file.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T15:12:08.589Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2020-09-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on URayTech IPTV/H.264/H.265 video encoders through 1.97. Attackers can log in as root via the password that is hard-coded in the executable file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-10-06T13:10:17",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-24218",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered on URayTech IPTV/H.264/H.265 video encoders through 1.97. Attackers can log in as root via the password that is hard-coded in the executable file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.kb.cert.org/vuls/id/896979",
"refsource": "MISC",
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"name": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/",
"refsource": "MISC",
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2020-24218",
"datePublished": "2020-10-06T13:10:17",
"dateReserved": "2020-08-13T00:00:00",
"dateUpdated": "2024-08-04T15:12:08.589Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-24217 (GCVE-0-2020-24217)
Vulnerability from nvd – Published: 2020-10-06 13:05 – Updated: 2024-08-04 15:12
VLAI?
Summary
An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. The file-upload endpoint does not enforce authentication. Attackers can send an unauthenticated HTTP request to upload a custom firmware component, possibly in conjunction with command injection, to achieve arbitrary code execution.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T15:12:07.203Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/159599/HiSilicon-Video-Encoder-Malicious-Firmware-Code-Execution.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/159597/HiSilicon-Video-Encoder-Command-Injection.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2020-09-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. The file-upload endpoint does not enforce authentication. Attackers can send an unauthenticated HTTP request to upload a custom firmware component, possibly in conjunction with command injection, to achieve arbitrary code execution."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-10-19T17:06:20",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/159599/HiSilicon-Video-Encoder-Malicious-Firmware-Code-Execution.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/159597/HiSilicon-Video-Encoder-Command-Injection.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-24217",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. The file-upload endpoint does not enforce authentication. Attackers can send an unauthenticated HTTP request to upload a custom firmware component, possibly in conjunction with command injection, to achieve arbitrary code execution."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.kb.cert.org/vuls/id/896979",
"refsource": "MISC",
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"name": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/",
"refsource": "MISC",
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
},
{
"name": "http://packetstormsecurity.com/files/159599/HiSilicon-Video-Encoder-Malicious-Firmware-Code-Execution.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/159599/HiSilicon-Video-Encoder-Malicious-Firmware-Code-Execution.html"
},
{
"name": "http://packetstormsecurity.com/files/159597/HiSilicon-Video-Encoder-Command-Injection.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/159597/HiSilicon-Video-Encoder-Command-Injection.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2020-24217",
"datePublished": "2020-10-06T13:05:36",
"dateReserved": "2020-08-13T00:00:00",
"dateUpdated": "2024-08-04T15:12:07.203Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-24216 (GCVE-0-2020-24216)
Vulnerability from nvd – Published: 2020-10-06 13:02 – Updated: 2024-08-04 15:12
VLAI?
Summary
An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. When the administrator configures a secret URL for RTSP streaming, the stream is still available via its default name such as /0. Unauthenticated attackers can view video streams that are meant to be private.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T15:12:08.336Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2020-09-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. When the administrator configures a secret URL for RTSP streaming, the stream is still available via its default name such as /0. Unauthenticated attackers can view video streams that are meant to be private."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-10-06T13:02:48",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-24216",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. When the administrator configures a secret URL for RTSP streaming, the stream is still available via its default name such as /0. Unauthenticated attackers can view video streams that are meant to be private."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.kb.cert.org/vuls/id/896979",
"refsource": "MISC",
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"name": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/",
"refsource": "MISC",
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2020-24216",
"datePublished": "2020-10-06T13:02:48",
"dateReserved": "2020-08-13T00:00:00",
"dateUpdated": "2024-08-04T15:12:08.336Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-24215 (GCVE-0-2020-24215)
Vulnerability from nvd – Published: 2020-10-06 13:00 – Updated: 2024-08-04 15:12
VLAI?
Summary
An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. Attackers can use hard-coded credentials in HTTP requests to perform any administrative task on the device including retrieving the device's configuration (with the cleartext admin password), and uploading a custom firmware update, to ultimately achieve arbitrary code execution.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T15:12:08.683Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/159601/HiSilicon-Video-Encoder-Backdoor-Password.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2020-09-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. Attackers can use hard-coded credentials in HTTP requests to perform any administrative task on the device including retrieving the device\u0027s configuration (with the cleartext admin password), and uploading a custom firmware update, to ultimately achieve arbitrary code execution."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-10-19T17:06:23",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/159601/HiSilicon-Video-Encoder-Backdoor-Password.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-24215",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. Attackers can use hard-coded credentials in HTTP requests to perform any administrative task on the device including retrieving the device\u0027s configuration (with the cleartext admin password), and uploading a custom firmware update, to ultimately achieve arbitrary code execution."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.kb.cert.org/vuls/id/896979",
"refsource": "MISC",
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"name": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/",
"refsource": "MISC",
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
},
{
"name": "http://packetstormsecurity.com/files/159601/HiSilicon-Video-Encoder-Backdoor-Password.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/159601/HiSilicon-Video-Encoder-Backdoor-Password.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2020-24215",
"datePublished": "2020-10-06T13:00:33",
"dateReserved": "2020-08-13T00:00:00",
"dateUpdated": "2024-08-04T15:12:08.683Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-24214 (GCVE-0-2020-24214)
Vulnerability from nvd – Published: 2020-10-06 12:58 – Updated: 2024-08-04 15:12
VLAI?
Summary
An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. Attackers can send a crafted unauthenticated RTSP request to cause a buffer overflow and application crash. The device will not be able to perform its main purpose of video encoding and streaming for up to a minute, until it automatically reboots. Attackers can send malicious requests once a minute, effectively disabling the device.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T15:12:08.326Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/159605/HiSilicon-Video-Encoder-Buffer-Overflow-Denial-Of-Service.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2020-09-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. Attackers can send a crafted unauthenticated RTSP request to cause a buffer overflow and application crash. The device will not be able to perform its main purpose of video encoding and streaming for up to a minute, until it automatically reboots. Attackers can send malicious requests once a minute, effectively disabling the device."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-10-19T17:06:21",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/159605/HiSilicon-Video-Encoder-Buffer-Overflow-Denial-Of-Service.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-24214",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. Attackers can send a crafted unauthenticated RTSP request to cause a buffer overflow and application crash. The device will not be able to perform its main purpose of video encoding and streaming for up to a minute, until it automatically reboots. Attackers can send malicious requests once a minute, effectively disabling the device."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.kb.cert.org/vuls/id/896979",
"refsource": "MISC",
"url": "https://www.kb.cert.org/vuls/id/896979"
},
{
"name": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/",
"refsource": "MISC",
"url": "https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/"
},
{
"name": "http://packetstormsecurity.com/files/159605/HiSilicon-Video-Encoder-Buffer-Overflow-Denial-Of-Service.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/159605/HiSilicon-Video-Encoder-Buffer-Overflow-Denial-Of-Service.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2020-24214",
"datePublished": "2020-10-06T12:58:05",
"dateReserved": "2020-08-13T00:00:00",
"dateUpdated": "2024-08-04T15:12:08.326Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}