CVE-2019-9682 (GCVE-0-2019-9682)

Vulnerability from cvelistv5 – Published: 2020-05-13 15:10 – Updated: 2024-08-04 21:54
VLAI?
Summary
Dahua devices with Build time before December 2019 use strong security login mode by default, but in order to be compatible with the normal login of early devices, some devices retain the weak security login mode that users can control. If the user uses a weak security login method, an attacker can monitor the device network to intercept network packets to attack the device. So it is recommended that the user disable this login method.
Severity ?
No CVSS data available.
CWE
  • Replay Attacks
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T21:54:45.174Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.dahuasecurity.com/support/cybersecurity/details/767"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "IPC-HX2XXX Series,IPC-HXXX5X4X Series,IPC-HX5842H,IPC-HX7842H,NVR 5x Series,NVR 4x Series,SD6AL Series,SD5A Series,SD1A Series,PTZ1A Series,SD50/52C Series,IPC-HDBW1320E-W",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Versions which Build time before December,2019"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Dahua devices with Build time before December 2019 use strong security login mode by default, but in order to be compatible with the normal login of early devices, some devices retain the weak security login mode that users can control. If the user uses a weak security login method, an attacker can monitor the device network to intercept network packets to attack the device. So it is recommended that the user disable this login method."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Replay Attacks",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-05-13T15:10:43",
        "orgId": "79ee569e-7d1e-4364-98f0-3a18e2a739ad",
        "shortName": "dahua"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.dahuasecurity.com/support/cybersecurity/details/767"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cybersecurity@dahuatech.com",
          "ID": "CVE-2019-9682",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "IPC-HX2XXX Series,IPC-HXXX5X4X Series,IPC-HX5842H,IPC-HX7842H,NVR 5x Series,NVR 4x Series,SD6AL Series,SD5A Series,SD1A Series,PTZ1A Series,SD50/52C Series,IPC-HDBW1320E-W",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions which Build time before December,2019"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Dahua devices with Build time before December 2019 use strong security login mode by default, but in order to be compatible with the normal login of early devices, some devices retain the weak security login mode that users can control. If the user uses a weak security login method, an attacker can monitor the device network to intercept network packets to attack the device. So it is recommended that the user disable this login method."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Replay Attacks"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.dahuasecurity.com/support/cybersecurity/details/767",
              "refsource": "MISC",
              "url": "https://www.dahuasecurity.com/support/cybersecurity/details/767"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "79ee569e-7d1e-4364-98f0-3a18e2a739ad",
    "assignerShortName": "dahua",
    "cveId": "CVE-2019-9682",
    "datePublished": "2020-05-13T15:10:43",
    "dateReserved": "2019-03-11T00:00:00",
    "dateUpdated": "2024-08-04T21:54:45.174Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:sd6al_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"B1CE773D-CA5F-483C-B20C-DAD30A590DDD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:sd6al:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C35F4371-334B-4EA8-8F48-498C81652F7C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:sd5a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"083AE420-CAF9-4A2A-8C76-79DD590FA191\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:sd5a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1EE24474-EF35-4475-99DD-4B54D6AF0B2D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:sd1a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"9A075994-60D1-40B7-9EF6-8048CBC18764\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:sd1a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A3C5893-E1D0-4E06-9F7F-058B657E4493\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:ptz1a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"F78D2E9E-9909-4130-A146-CA861F7DF341\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:ptz1a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19B57B9D-0729-48E0-892B-E39AE1F89AB4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:sd50_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"18CD222C-C95A-4D5E-A763-5D2F74EAEC04\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:sd50:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"984AD4D5-D689-4150-A1EE-D48B81CBB7C8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:sd52c_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"0ECBC0BF-171E-49FD-B6AF-CC7B29D39FB7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:sd52c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5BA0D206-5BE7-4592-8D3E-641F47164770\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:ipc-hx5842h_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"9E8CB654-0526-4E7A-8984-8350B39BB4DF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:ipc-hx5842h:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"724F4B7D-C8C1-4914-B1D6-B4CB9B1F4093\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:ipc-hx7842h_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"3AEBFC1D-9F25-4FDB-A191-D7D6C1C6E234\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:ipc-hx7842h:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D6E27D8-C608-49E7-8284-5196EDB428DB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:ipc-hx2xxx_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"A046C7EA-F954-4F36-9ED3-DBA84F1FB2D3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:ipc-hx2xxx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B8887C8-C335-4EBB-BC7F-D4F8D8205DAE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:ipc-hxxx5x4x_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"DCD8DCD2-5CEA-420F-860C-11B469D9FF8F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:ipc-hxxx5x4x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F051A1A0-E841-42E7-92A3-E45E4017DCDE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:n42b1p_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"F092AA97-7184-4499-BB83-D6204BD4621B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:n42b1p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCB3A7FD-63A2-423C-912F-E2E5B4690CF1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:n42b2p_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"855B3C5F-CE9D-4FFA-B485-11A8D675F006\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:n42b2p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83B0FAFA-BEF4-4196-A4BC-4CFD6DCF4986\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:n42b3p_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"1D0E03DE-1BFA-43AD-9AC6-72A1A1545D4B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:n42b3p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B51E9FED-4929-42CC-AA6F-BFF61E8F88C0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:n52a4p_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"F20B6467-53DC-4DC6-BCC2-6B6B33ABD65D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:n52a4p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB41CE1D-1A97-4549-A849-D06F78858CA3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:n54a4p_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"BFA91720-5AE4-48B6-A940-A4DBE650591D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:n54a4p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D479D171-7F30-4D6B-8A49-0A3967103B94\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:n52b2p_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"ACD4FD87-1D74-4895-AA89-D26541A55433\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:n52b2p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7936F0A3-F6DF-47B2-898E-DBE68B369633\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:n52b5p_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"3D5136C6-2355-4782-BF9C-0874DC5B0CDA\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:n52b5p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"195D7533-B2EF-4BC2-B6D6-0B141FB90090\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:n52b3p_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"7180D6E1-6F7F-4EAD-BD51-02C029EFB034\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:n52b3p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03D1AD58-447D-4D30-B9CF-48B5CB743C2B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:n54b2p_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"AEC0287A-824B-46D0-84AB-54BEEF90E16B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:n54b2p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5667962D-1A47-4D77-95A4-6B34F8863761\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:ipc-hdbw1320e-w_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"1CBF6051-B1DF-4028-ADC1-CF3820C1CA71\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:ipc-hdbw1320e-w:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F221BD07-E754-4355-B031-A95147905815\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Dahua devices with Build time before December 2019 use strong security login mode by default, but in order to be compatible with the normal login of early devices, some devices retain the weak security login mode that users can control. If the user uses a weak security login method, an attacker can monitor the device network to intercept network packets to attack the device. So it is recommended that the user disable this login method.\"}, {\"lang\": \"es\", \"value\": \"Los dispositivos Dahua con tiempo de Compilaci\\u00f3n antes de diciembre de 2019, usan un modo de inicio de sesi\\u00f3n de seguridad fuerte por defecto, pero en funci\\u00f3n de ser compatibles con el inicio de sesi\\u00f3n normal de los primeros dispositivos, algunos dispositivos conservan el modo de inicio de sesi\\u00f3n de seguridad d\\u00e9bil que los usuarios pueden controlar. Si el usuario usa un m\\u00e9todo de inicio de sesi\\u00f3n de seguridad d\\u00e9bil, un atacante puede monitorear la red del dispositivo para interceptar los paquetes de red para atacar el dispositivo. Por lo tanto, es recomendado que el usuario desactive este m\\u00e9todo de inicio de sesi\\u00f3n.\"}]",
      "id": "CVE-2019-9682",
      "lastModified": "2024-11-21T04:52:06.380",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.1, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.2, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2020-05-13T16:15:12.870",
      "references": "[{\"url\": \"https://www.dahuasecurity.com/support/cybersecurity/details/767\", \"source\": \"cybersecurity@dahuatech.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.dahuasecurity.com/support/cybersecurity/details/767\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "cybersecurity@dahuatech.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-276\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2019-9682\",\"sourceIdentifier\":\"cybersecurity@dahuatech.com\",\"published\":\"2020-05-13T16:15:12.870\",\"lastModified\":\"2024-11-21T04:52:06.380\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Dahua devices with Build time before December 2019 use strong security login mode by default, but in order to be compatible with the normal login of early devices, some devices retain the weak security login mode that users can control. If the user uses a weak security login method, an attacker can monitor the device network to intercept network packets to attack the device. So it is recommended that the user disable this login method.\"},{\"lang\":\"es\",\"value\":\"Los dispositivos Dahua con tiempo de Compilaci\u00f3n antes de diciembre de 2019, usan un modo de inicio de sesi\u00f3n de seguridad fuerte por defecto, pero en funci\u00f3n de ser compatibles con el inicio de sesi\u00f3n normal de los primeros dispositivos, algunos dispositivos conservan el modo de inicio de sesi\u00f3n de seguridad d\u00e9bil que los usuarios pueden controlar. Si el usuario usa un m\u00e9todo de inicio de sesi\u00f3n de seguridad d\u00e9bil, un atacante puede monitorear la red del dispositivo para interceptar los paquetes de red para atacar el dispositivo. Por lo tanto, es recomendado que el usuario desactive este m\u00e9todo de inicio de sesi\u00f3n.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-276\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:sd6al_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"B1CE773D-CA5F-483C-B20C-DAD30A590DDD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:sd6al:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C35F4371-334B-4EA8-8F48-498C81652F7C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:sd5a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"083AE420-CAF9-4A2A-8C76-79DD590FA191\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:sd5a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EE24474-EF35-4475-99DD-4B54D6AF0B2D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:sd1a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"9A075994-60D1-40B7-9EF6-8048CBC18764\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:sd1a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A3C5893-E1D0-4E06-9F7F-058B657E4493\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:ptz1a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"F78D2E9E-9909-4130-A146-CA861F7DF341\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:ptz1a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19B57B9D-0729-48E0-892B-E39AE1F89AB4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:sd50_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"18CD222C-C95A-4D5E-A763-5D2F74EAEC04\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:sd50:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"984AD4D5-D689-4150-A1EE-D48B81CBB7C8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:sd52c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"0ECBC0BF-171E-49FD-B6AF-CC7B29D39FB7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:sd52c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BA0D206-5BE7-4592-8D3E-641F47164770\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:ipc-hx5842h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"9E8CB654-0526-4E7A-8984-8350B39BB4DF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:ipc-hx5842h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"724F4B7D-C8C1-4914-B1D6-B4CB9B1F4093\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:ipc-hx7842h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"3AEBFC1D-9F25-4FDB-A191-D7D6C1C6E234\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:ipc-hx7842h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D6E27D8-C608-49E7-8284-5196EDB428DB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:ipc-hx2xxx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"A046C7EA-F954-4F36-9ED3-DBA84F1FB2D3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:ipc-hx2xxx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B8887C8-C335-4EBB-BC7F-D4F8D8205DAE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:ipc-hxxx5x4x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"DCD8DCD2-5CEA-420F-860C-11B469D9FF8F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:ipc-hxxx5x4x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F051A1A0-E841-42E7-92A3-E45E4017DCDE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:n42b1p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"F092AA97-7184-4499-BB83-D6204BD4621B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:n42b1p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCB3A7FD-63A2-423C-912F-E2E5B4690CF1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:n42b2p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"855B3C5F-CE9D-4FFA-B485-11A8D675F006\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:n42b2p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83B0FAFA-BEF4-4196-A4BC-4CFD6DCF4986\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:n42b3p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"1D0E03DE-1BFA-43AD-9AC6-72A1A1545D4B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:n42b3p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B51E9FED-4929-42CC-AA6F-BFF61E8F88C0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:n52a4p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"F20B6467-53DC-4DC6-BCC2-6B6B33ABD65D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:n52a4p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB41CE1D-1A97-4549-A849-D06F78858CA3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:n54a4p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"BFA91720-5AE4-48B6-A940-A4DBE650591D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:n54a4p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D479D171-7F30-4D6B-8A49-0A3967103B94\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:n52b2p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"ACD4FD87-1D74-4895-AA89-D26541A55433\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:n52b2p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7936F0A3-F6DF-47B2-898E-DBE68B369633\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:n52b5p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"3D5136C6-2355-4782-BF9C-0874DC5B0CDA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:n52b5p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"195D7533-B2EF-4BC2-B6D6-0B141FB90090\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:n52b3p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"7180D6E1-6F7F-4EAD-BD51-02C029EFB034\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:n52b3p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03D1AD58-447D-4D30-B9CF-48B5CB743C2B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:n54b2p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"AEC0287A-824B-46D0-84AB-54BEEF90E16B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:n54b2p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5667962D-1A47-4D77-95A4-6B34F8863761\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:ipc-hdbw1320e-w_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"1CBF6051-B1DF-4028-ADC1-CF3820C1CA71\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:ipc-hdbw1320e-w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F221BD07-E754-4355-B031-A95147905815\"}]}]}],\"references\":[{\"url\":\"https://www.dahuasecurity.com/support/cybersecurity/details/767\",\"source\":\"cybersecurity@dahuatech.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.dahuasecurity.com/support/cybersecurity/details/767\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…