VAR-200306-0102

Vulnerability from variot - Updated: 2023-12-18 13:40

The web-based administration capability for various Axis Network Camera products allows remote attackers to bypass access restrictions and modify configuration via an HTTP request to the admin/admin.shtml containing a leading // (double slash). A vulnerability in various Axis Communications products may allow unauthorized remote privileged access. By making a request for a specially formatted URL, it may be possible for remote users to access the administrative configuration interface without being prompted for authentication. Axis network video can transmit and capture on-site images directly through IP network, allowing users to view and manage the camera system with a WEB browser. The management tool of the Axis network video system does not properly handle user access restrictions. After setting up the Axis network video system, a WEB-based management tool is provided for users to access to configure and manage the camera system. Users can access it by requesting the following URL: http://camera-ip/admin/admin.shtml However, the above connection needs to provide a user name and password, but due to the incorrect design of access restrictions, an attacker can access the management interface without a password by submitting the following URL: http://camera-ip//admin/admin.shtml The user can reset the RO0T password, then modify the configuration file through the telnet service program, and execute arbitrary commands on the system with root user privileges through non-interactive access

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200306-0102",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "2401 video server",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.32"
      },
      {
        "model": "2100 network camera",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.32"
      },
      {
        "model": "2400 video server",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.32"
      },
      {
        "model": "2120 network camera",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.32"
      },
      {
        "model": "2110 network camera",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.32"
      },
      {
        "model": "2460 network dvr",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "axis",
        "version": "3.00"
      },
      {
        "model": "2130 ptz network camera",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.32"
      },
      {
        "model": "250s video server",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "axis",
        "version": "3.02"
      },
      {
        "model": "2420 network camera",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.32"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "axis",
        "version": null
      },
      {
        "model": "2400 video server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "axis",
        "version": "2.32"
      },
      {
        "model": "2460 network dvr",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "axis",
        "version": "3.00"
      },
      {
        "model": "2110 network camera",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "axis",
        "version": "2.32"
      },
      {
        "model": "2420 network camera",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "axis",
        "version": "2.32"
      },
      {
        "model": "2130 ptz network camera",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "axis",
        "version": "2.32"
      },
      {
        "model": "250s video server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "axis",
        "version": "3.02"
      },
      {
        "model": "2401 video server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "axis",
        "version": "2.32"
      },
      {
        "model": "2120 network camera",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "axis",
        "version": "2.32"
      },
      {
        "model": "2100 network camera",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "axis",
        "version": "2.32"
      },
      {
        "model": "communications video server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24002.31"
      },
      {
        "model": "communications ptz network camera",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21302.34"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24202.32"
      },
      {
        "model": "communications network dvr",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24603.10"
      },
      {
        "model": "communications ptz network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21302.30"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21002.31"
      },
      {
        "model": "communications video server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24002.30"
      },
      {
        "model": "communications network camera",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21002.34"
      },
      {
        "model": "communications network camera",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21202.34"
      },
      {
        "model": "communications ptz network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21302.31"
      },
      {
        "model": "communications video server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24012.31"
      },
      {
        "model": "communications video server",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24012.34"
      },
      {
        "model": "communications video server",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24002.34"
      },
      {
        "model": "communications video server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24002.32"
      },
      {
        "model": "communications network camera",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24202.34"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21002.32"
      },
      {
        "model": "communications ptz network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21302.32"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21002.30"
      },
      {
        "model": "communications video server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24012.32"
      },
      {
        "model": "communications video server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24202.32"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21202.30"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21102.30"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21202.32"
      },
      {
        "model": "communications network camera",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21102.34"
      },
      {
        "model": "communications video server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24012.30"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21202.31"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24202.31"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21102.31"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24202.30"
      },
      {
        "model": "communications 250s video server",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "axis",
        "version": "3.03"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21102.32"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#799060"
      },
      {
        "db": "BID",
        "id": "7652"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0240"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200306-010"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:axis:2110_network_camera:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "2.32",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2120_network_camera:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "2.32",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "2.32",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:250s_video_server:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "3.02",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2130_ptz_network_camera:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "2.32",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2400_video_server:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "2.32",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2401_video_server:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "2.32",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2420_network_camera:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "2.32",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2460_network_dvr:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "3.00",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2003-0240"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Core Security Technologies Advisory",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200306-010"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2003-0240",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": true,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-7069",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2003-0240",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#799060",
            "trust": 0.8,
            "value": "15.00"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200306-010",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-7069",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#799060"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7069"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0240"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200306-010"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The web-based administration capability for various Axis Network Camera products allows remote attackers to bypass access restrictions and modify configuration via an HTTP request to the admin/admin.shtml containing a leading // (double slash). A vulnerability in various Axis Communications products may allow unauthorized remote privileged access. By making a request for a specially formatted URL, it may be possible for remote users to access the administrative configuration interface without being prompted for authentication. Axis network video can transmit and capture on-site images directly through IP network, allowing users to view and manage the camera system with a WEB browser. The management tool of the Axis network video system does not properly handle user access restrictions. After setting up the Axis network video system, a WEB-based management tool is provided for users to access to configure and manage the camera system. Users can access it by requesting the following URL: http://camera-ip/admin/admin.shtml However, the above connection needs to provide a user name and password, but due to the incorrect design of access restrictions, an attacker can access the management interface without a password by submitting the following URL: http://camera-ip//admin/admin.shtml The user can reset the RO0T password, then modify the configuration file through the telnet service program, and execute arbitrary commands on the system with root user privileges through non-interactive access",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2003-0240"
      },
      {
        "db": "CERT/CC",
        "id": "VU#799060"
      },
      {
        "db": "BID",
        "id": "7652"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7069"
      }
    ],
    "trust": 1.98
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-7069",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-7069"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "7652",
        "trust": 2.8
      },
      {
        "db": "SECTRACK",
        "id": "1006854",
        "trust": 2.5
      },
      {
        "db": "SECUNIA",
        "id": "8876",
        "trust": 2.5
      },
      {
        "db": "CERT/CC",
        "id": "VU#799060",
        "trust": 2.5
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0240",
        "trust": 2.0
      },
      {
        "db": "OSVDB",
        "id": "4804",
        "trust": 1.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200306-010",
        "trust": 0.7
      },
      {
        "db": "BUGTRAQ",
        "id": "20030527 CORE-2003-0403: AXIS NETWORK CAMERA HTTP AUTHENTICATION BYPASS",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "12104",
        "trust": 0.6
      },
      {
        "db": "EXPLOIT-DB",
        "id": "22626",
        "trust": 0.1
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-76425",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-7069",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#799060"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7069"
      },
      {
        "db": "BID",
        "id": "7652"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0240"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200306-010"
      }
    ]
  },
  "id": "VAR-200306-0102",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-7069"
      }
    ],
    "trust": 0.54047618
  },
  "last_update_date": "2023-12-18T13:40:59.036000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2003-0240"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://www.securityfocus.com/bid/7652"
      },
      {
        "trust": 2.4,
        "url": "http://www.coresecurity.com/common/showdoc.php?idx=329\u0026idxseccion=10"
      },
      {
        "trust": 1.7,
        "url": "http://www.kb.cert.org/vuls/id/799060"
      },
      {
        "trust": 1.7,
        "url": "http://www.osvdb.org/4804"
      },
      {
        "trust": 1.7,
        "url": "http://securitytracker.com/id?1006854"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/8876"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12104"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=bugtraq\u0026m=105406374731579\u0026w=2"
      },
      {
        "trust": 0.8,
        "url": "http://securitytracker.com/alerts/2003/may/1006854.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.iss.net/security_center/static/12104.php"
      },
      {
        "trust": 0.8,
        "url": "http://www.secunia.com/advisories/8876/"
      },
      {
        "trust": 0.8,
        "url": "http://www.axis.com/us/aboutus.asp"
      },
      {
        "trust": 0.8,
        "url": "http://www.axis.com/"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/12104"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=105406374731579\u0026w=2"
      },
      {
        "trust": 0.3,
        "url": "http://www.axis.com/products/camera_servers/index.htm"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=105406374731579\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://www.coresecurity.com/common/showdoc.php?idx=329\u0026amp;idxseccion=10"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#799060"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7069"
      },
      {
        "db": "BID",
        "id": "7652"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0240"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200306-010"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#799060"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7069"
      },
      {
        "db": "BID",
        "id": "7652"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0240"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200306-010"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2003-06-05T00:00:00",
        "db": "CERT/CC",
        "id": "VU#799060"
      },
      {
        "date": "2003-06-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-7069"
      },
      {
        "date": "2003-05-27T00:00:00",
        "db": "BID",
        "id": "7652"
      },
      {
        "date": "2003-06-09T04:00:00",
        "db": "NVD",
        "id": "CVE-2003-0240"
      },
      {
        "date": "2003-05-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200306-010"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2003-06-05T00:00:00",
        "db": "CERT/CC",
        "id": "VU#799060"
      },
      {
        "date": "2017-07-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-7069"
      },
      {
        "date": "2009-07-11T22:06:00",
        "db": "BID",
        "id": "7652"
      },
      {
        "date": "2017-07-11T01:29:29.463000",
        "db": "NVD",
        "id": "CVE-2003-0240"
      },
      {
        "date": "2005-10-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200306-010"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200306-010"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Various Axis products allow unauthorized remote privileged access",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#799060"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "access verification error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200306-010"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…