CVE-2020-9502 (GCVE-0-2020-9502)
Vulnerability from cvelistv5 – Published: 2020-05-13 15:21 – Updated: 2024-08-04 10:34
VLAI?
Summary
Some Dahua products with Build time before December 2019 have Session ID predictable vulnerabilities. During normal user access, an attacker can use the predicted Session ID to construct a data packet to attack the device.
Severity ?
No CVSS data available.
CWE
- Session hijacking
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | IPC-HX2XXX Series,IPC-HXXX5X4X Series,IPC-HX5842H,IPC-HX7842H,NVR 5x Series,NVR 4x Series,SD6AL Series,SD5A Series,SD1A Series,PTZ1A Series,SD50/52C Series,IPC-HFW1431S |
Affected:
Versions which Build time before December,2019
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T10:34:38.156Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.dahuasecurity.com/support/cybersecurity/details/777"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "IPC-HX2XXX Series,IPC-HXXX5X4X Series,IPC-HX5842H,IPC-HX7842H,NVR 5x Series,NVR 4x Series,SD6AL Series,SD5A Series,SD1A Series,PTZ1A Series,SD50/52C Series,IPC-HFW1431S",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Versions which Build time before December,2019"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Some Dahua products with Build time before December 2019 have Session ID predictable vulnerabilities. During normal user access, an attacker can use the predicted Session ID to construct a data packet to attack the device."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Session hijacking",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-05-13T15:21:12",
"orgId": "79ee569e-7d1e-4364-98f0-3a18e2a739ad",
"shortName": "dahua"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.dahuasecurity.com/support/cybersecurity/details/777"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cybersecurity@dahuatech.com",
"ID": "CVE-2020-9502",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "IPC-HX2XXX Series,IPC-HXXX5X4X Series,IPC-HX5842H,IPC-HX7842H,NVR 5x Series,NVR 4x Series,SD6AL Series,SD5A Series,SD1A Series,PTZ1A Series,SD50/52C Series,IPC-HFW1431S",
"version": {
"version_data": [
{
"version_value": "Versions which Build time before December,2019"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Some Dahua products with Build time before December 2019 have Session ID predictable vulnerabilities. During normal user access, an attacker can use the predicted Session ID to construct a data packet to attack the device."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Session hijacking"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.dahuasecurity.com/support/cybersecurity/details/777",
"refsource": "MISC",
"url": "https://www.dahuasecurity.com/support/cybersecurity/details/777"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "79ee569e-7d1e-4364-98f0-3a18e2a739ad",
"assignerShortName": "dahua",
"cveId": "CVE-2020-9502",
"datePublished": "2020-05-13T15:21:12",
"dateReserved": "2020-03-01T00:00:00",
"dateUpdated": "2024-08-04T10:34:38.156Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:sd6al_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"B1CE773D-CA5F-483C-B20C-DAD30A590DDD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:sd6al:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C35F4371-334B-4EA8-8F48-498C81652F7C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:sd5a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"083AE420-CAF9-4A2A-8C76-79DD590FA191\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:sd5a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1EE24474-EF35-4475-99DD-4B54D6AF0B2D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:sd1a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"9A075994-60D1-40B7-9EF6-8048CBC18764\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:sd1a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A3C5893-E1D0-4E06-9F7F-058B657E4493\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:ptz1a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"F78D2E9E-9909-4130-A146-CA861F7DF341\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:ptz1a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19B57B9D-0729-48E0-892B-E39AE1F89AB4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:sd50_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"18CD222C-C95A-4D5E-A763-5D2F74EAEC04\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:sd50:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"984AD4D5-D689-4150-A1EE-D48B81CBB7C8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:sd52c_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"0ECBC0BF-171E-49FD-B6AF-CC7B29D39FB7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:sd52c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5BA0D206-5BE7-4592-8D3E-641F47164770\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:ipc-hx5842h_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"9E8CB654-0526-4E7A-8984-8350B39BB4DF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:ipc-hx5842h:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"724F4B7D-C8C1-4914-B1D6-B4CB9B1F4093\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:ipc-hx7842h_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"3AEBFC1D-9F25-4FDB-A191-D7D6C1C6E234\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:ipc-hx7842h:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D6E27D8-C608-49E7-8284-5196EDB428DB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:ipc-hx2xxx_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"A046C7EA-F954-4F36-9ED3-DBA84F1FB2D3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:ipc-hx2xxx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B8887C8-C335-4EBB-BC7F-D4F8D8205DAE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:ipc-hxxx5x4x_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"DCD8DCD2-5CEA-420F-860C-11B469D9FF8F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:ipc-hxxx5x4x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F051A1A0-E841-42E7-92A3-E45E4017DCDE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:n42b1p_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"F092AA97-7184-4499-BB83-D6204BD4621B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:n42b1p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCB3A7FD-63A2-423C-912F-E2E5B4690CF1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:n42b2p_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"855B3C5F-CE9D-4FFA-B485-11A8D675F006\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:n42b2p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83B0FAFA-BEF4-4196-A4BC-4CFD6DCF4986\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:n42b3p_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"1D0E03DE-1BFA-43AD-9AC6-72A1A1545D4B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:n42b3p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B51E9FED-4929-42CC-AA6F-BFF61E8F88C0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:n52a4p_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"F20B6467-53DC-4DC6-BCC2-6B6B33ABD65D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:n52a4p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB41CE1D-1A97-4549-A849-D06F78858CA3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:n54a4p_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"BFA91720-5AE4-48B6-A940-A4DBE650591D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:n54a4p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D479D171-7F30-4D6B-8A49-0A3967103B94\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:n52b2p_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"ACD4FD87-1D74-4895-AA89-D26541A55433\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:n52b2p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7936F0A3-F6DF-47B2-898E-DBE68B369633\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:n52b5p_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"3D5136C6-2355-4782-BF9C-0874DC5B0CDA\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:n52b5p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"195D7533-B2EF-4BC2-B6D6-0B141FB90090\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:n52b3p_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"7180D6E1-6F7F-4EAD-BD51-02C029EFB034\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:n52b3p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03D1AD58-447D-4D30-B9CF-48B5CB743C2B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:n54b2p_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"AEC0287A-824B-46D0-84AB-54BEEF90E16B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:n54b2p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5667962D-1A47-4D77-95A4-6B34F8863761\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:ipc-hdbw1320e-w_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2019-12\", \"matchCriteriaId\": \"1CBF6051-B1DF-4028-ADC1-CF3820C1CA71\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:ipc-hdbw1320e-w:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F221BD07-E754-4355-B031-A95147905815\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Some Dahua products with Build time before December 2019 have Session ID predictable vulnerabilities. During normal user access, an attacker can use the predicted Session ID to construct a data packet to attack the device.\"}, {\"lang\": \"es\", \"value\": \"Algunos productos Dahua con tiempo de Compilaci\\u00f3n antes de diciembre de 2019 presentan vulnerabilidades predecibles del ID de Sesi\\u00f3n. Durante un acceso de usuario normal, un atacante puede usar el ID de Sesi\\u00f3n previsto para construir un paquete de datos para atacar el dispositivo.\"}]",
"id": "CVE-2020-9502",
"lastModified": "2024-11-21T05:40:47.147",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2020-05-13T16:15:13.277",
"references": "[{\"url\": \"https://www.dahuasecurity.com/support/cybersecurity/details/777\", \"source\": \"cybersecurity@dahuatech.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.dahuasecurity.com/support/cybersecurity/details/777\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "cybersecurity@dahuatech.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-330\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2020-9502\",\"sourceIdentifier\":\"cybersecurity@dahuatech.com\",\"published\":\"2020-05-13T16:15:13.277\",\"lastModified\":\"2024-11-21T05:40:47.147\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Some Dahua products with Build time before December 2019 have Session ID predictable vulnerabilities. During normal user access, an attacker can use the predicted Session ID to construct a data packet to attack the device.\"},{\"lang\":\"es\",\"value\":\"Algunos productos Dahua con tiempo de Compilaci\u00f3n antes de diciembre de 2019 presentan vulnerabilidades predecibles del ID de Sesi\u00f3n. Durante un acceso de usuario normal, un atacante puede usar el ID de Sesi\u00f3n previsto para construir un paquete de datos para atacar el dispositivo.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-330\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:sd6al_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"B1CE773D-CA5F-483C-B20C-DAD30A590DDD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:sd6al:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C35F4371-334B-4EA8-8F48-498C81652F7C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:sd5a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"083AE420-CAF9-4A2A-8C76-79DD590FA191\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:sd5a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EE24474-EF35-4475-99DD-4B54D6AF0B2D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:sd1a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"9A075994-60D1-40B7-9EF6-8048CBC18764\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:sd1a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A3C5893-E1D0-4E06-9F7F-058B657E4493\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:ptz1a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"F78D2E9E-9909-4130-A146-CA861F7DF341\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:ptz1a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19B57B9D-0729-48E0-892B-E39AE1F89AB4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:sd50_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"18CD222C-C95A-4D5E-A763-5D2F74EAEC04\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:sd50:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"984AD4D5-D689-4150-A1EE-D48B81CBB7C8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:sd52c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"0ECBC0BF-171E-49FD-B6AF-CC7B29D39FB7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:sd52c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BA0D206-5BE7-4592-8D3E-641F47164770\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:ipc-hx5842h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"9E8CB654-0526-4E7A-8984-8350B39BB4DF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:ipc-hx5842h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"724F4B7D-C8C1-4914-B1D6-B4CB9B1F4093\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:ipc-hx7842h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"3AEBFC1D-9F25-4FDB-A191-D7D6C1C6E234\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:ipc-hx7842h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D6E27D8-C608-49E7-8284-5196EDB428DB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:ipc-hx2xxx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"A046C7EA-F954-4F36-9ED3-DBA84F1FB2D3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:ipc-hx2xxx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B8887C8-C335-4EBB-BC7F-D4F8D8205DAE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:ipc-hxxx5x4x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"DCD8DCD2-5CEA-420F-860C-11B469D9FF8F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:ipc-hxxx5x4x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F051A1A0-E841-42E7-92A3-E45E4017DCDE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:n42b1p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"F092AA97-7184-4499-BB83-D6204BD4621B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:n42b1p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCB3A7FD-63A2-423C-912F-E2E5B4690CF1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:n42b2p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"855B3C5F-CE9D-4FFA-B485-11A8D675F006\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:n42b2p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83B0FAFA-BEF4-4196-A4BC-4CFD6DCF4986\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:n42b3p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"1D0E03DE-1BFA-43AD-9AC6-72A1A1545D4B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:n42b3p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B51E9FED-4929-42CC-AA6F-BFF61E8F88C0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:n52a4p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"F20B6467-53DC-4DC6-BCC2-6B6B33ABD65D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:n52a4p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB41CE1D-1A97-4549-A849-D06F78858CA3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:n54a4p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"BFA91720-5AE4-48B6-A940-A4DBE650591D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:n54a4p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D479D171-7F30-4D6B-8A49-0A3967103B94\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:n52b2p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"ACD4FD87-1D74-4895-AA89-D26541A55433\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:n52b2p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7936F0A3-F6DF-47B2-898E-DBE68B369633\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:n52b5p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"3D5136C6-2355-4782-BF9C-0874DC5B0CDA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:n52b5p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"195D7533-B2EF-4BC2-B6D6-0B141FB90090\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:n52b3p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"7180D6E1-6F7F-4EAD-BD51-02C029EFB034\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:n52b3p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03D1AD58-447D-4D30-B9CF-48B5CB743C2B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:n54b2p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"AEC0287A-824B-46D0-84AB-54BEEF90E16B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:n54b2p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5667962D-1A47-4D77-95A4-6B34F8863761\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:ipc-hdbw1320e-w_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2019-12\",\"matchCriteriaId\":\"1CBF6051-B1DF-4028-ADC1-CF3820C1CA71\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:ipc-hdbw1320e-w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F221BD07-E754-4355-B031-A95147905815\"}]}]}],\"references\":[{\"url\":\"https://www.dahuasecurity.com/support/cybersecurity/details/777\",\"source\":\"cybersecurity@dahuatech.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.dahuasecurity.com/support/cybersecurity/details/777\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…