Vulnerabilites related to acti - camera_firmware
CVE-2017-3186 (GCVE-0-2017-3186)
Vulnerability from cvelistv5
Published
2017-12-15 14:00
Modified
2024-08-05 14:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-521 - Weak Password Requirements
Summary
ACTi cameras including the D, B, I, and E series using firmware version A1D-500-V6.11.31-AC use non-random default credentials across all devices. A remote attacker can take complete control of a device using default admin credentials.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
ACTi Corporation | ACTi D, B, I, and E series cameras |
Version: A1D-500-V6.11.31-AC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:16:28.334Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://twitter.com/hack3rsca/status/839599437907386368" }, { "name": "96720", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/96720/info" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://twitter.com/Hfuhs/status/839252357221330944" }, { "name": "VU#355151", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/355151" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ACTi D, B, I, and E series cameras", "vendor": "ACTi Corporation", "versions": [ { "status": "affected", "version": "A1D-500-V6.11.31-AC" } ] } ], "datePublic": "2017-03-07T00:00:00", "descriptions": [ { "lang": "en", "value": "ACTi cameras including the D, B, I, and E series using firmware version A1D-500-V6.11.31-AC use non-random default credentials across all devices. A remote attacker can take complete control of a device using default admin credentials." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-521", "description": "CWE-521: Weak Password Requirements", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-15T13:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://twitter.com/hack3rsca/status/839599437907386368" }, { "name": "96720", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/96720/info" }, { "tags": [ "x_refsource_MISC" ], "url": "https://twitter.com/Hfuhs/status/839252357221330944" }, { "name": "VU#355151", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/355151" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2017-3186", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ACTi D, B, I, and E series cameras", "version": { "version_data": [ { "version_value": "A1D-500-V6.11.31-AC" } ] } } ] }, "vendor_name": "ACTi Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ACTi cameras including the D, B, I, and E series using firmware version A1D-500-V6.11.31-AC use non-random default credentials across all devices. A remote attacker can take complete control of a device using default admin credentials." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-521: Weak Password Requirements" } ] } ] }, "references": { "reference_data": [ { "name": "https://twitter.com/hack3rsca/status/839599437907386368", "refsource": "MISC", "url": "https://twitter.com/hack3rsca/status/839599437907386368" }, { "name": "96720", "refsource": "BID", "url": "http://www.securityfocus.com/bid/96720/info" }, { "name": "https://twitter.com/Hfuhs/status/839252357221330944", "refsource": "MISC", "url": "https://twitter.com/Hfuhs/status/839252357221330944" }, { "name": "VU#355151", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/355151" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2017-3186", "datePublished": "2017-12-15T14:00:00", "dateReserved": "2016-12-05T00:00:00", "dateUpdated": "2024-08-05T14:16:28.334Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-3184 (GCVE-0-2017-3184)
Vulnerability from cvelistv5
Published
2017-12-15 14:00
Modified
2024-08-05 14:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-306 - Missing Authentication for Critical Function
Summary
ACTi cameras including the D, B, I, and E series using firmware version A1D-500-V6.11.31-AC fail to properly restrict access to the factory reset page. An unauthenticated, remote attacker can exploit this vulnerability by directly accessing the http://x.x.x.x/setup/setup_maintain_firmware-default.html page. This will allow an attacker to perform a factory reset on the device, leading to a denial of service condition or the ability to make use of default credentials (CVE-2017-3186).
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
ACTi Corporation | ACTi D, B, I, and E series cameras |
Version: A1D-500-V6.11.31-AC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:16:28.231Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://twitter.com/hack3rsca/status/839599437907386368" }, { "name": "96720", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/96720/info" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://twitter.com/Hfuhs/status/839252357221330944" }, { "name": "VU#355151", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/355151" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ACTi D, B, I, and E series cameras", "vendor": "ACTi Corporation", "versions": [ { "status": "affected", "version": "A1D-500-V6.11.31-AC" } ] } ], "datePublic": "2017-03-07T00:00:00", "descriptions": [ { "lang": "en", "value": "ACTi cameras including the D, B, I, and E series using firmware version A1D-500-V6.11.31-AC fail to properly restrict access to the factory reset page. An unauthenticated, remote attacker can exploit this vulnerability by directly accessing the http://x.x.x.x/setup/setup_maintain_firmware-default.html page. This will allow an attacker to perform a factory reset on the device, leading to a denial of service condition or the ability to make use of default credentials (CVE-2017-3186)." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306: Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-15T13:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://twitter.com/hack3rsca/status/839599437907386368" }, { "name": "96720", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/96720/info" }, { "tags": [ "x_refsource_MISC" ], "url": "https://twitter.com/Hfuhs/status/839252357221330944" }, { "name": "VU#355151", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/355151" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2017-3184", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ACTi D, B, I, and E series cameras", "version": { "version_data": [ { "version_value": "A1D-500-V6.11.31-AC" } ] } } ] }, "vendor_name": "ACTi Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ACTi cameras including the D, B, I, and E series using firmware version A1D-500-V6.11.31-AC fail to properly restrict access to the factory reset page. An unauthenticated, remote attacker can exploit this vulnerability by directly accessing the http://x.x.x.x/setup/setup_maintain_firmware-default.html page. This will allow an attacker to perform a factory reset on the device, leading to a denial of service condition or the ability to make use of default credentials (CVE-2017-3186)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-306: Missing Authentication for Critical Function" } ] } ] }, "references": { "reference_data": [ { "name": "https://twitter.com/hack3rsca/status/839599437907386368", "refsource": "MISC", "url": "https://twitter.com/hack3rsca/status/839599437907386368" }, { "name": "96720", "refsource": "BID", "url": "http://www.securityfocus.com/bid/96720/info" }, { "name": "https://twitter.com/Hfuhs/status/839252357221330944", "refsource": "MISC", "url": "https://twitter.com/Hfuhs/status/839252357221330944" }, { "name": "VU#355151", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/355151" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2017-3184", "datePublished": "2017-12-15T14:00:00", "dateReserved": "2016-12-05T00:00:00", "dateUpdated": "2024-08-05T14:16:28.231Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-3185 (GCVE-0-2017-3185)
Vulnerability from cvelistv5
Published
2017-12-15 14:00
Modified
2024-08-05 14:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-598 - Information Exposure Through Query Strings in GET Request
Summary
ACTi cameras including the D, B, I, and E series using firmware version A1D-500-V6.11.31-AC have a web application that uses the GET method to process requests that contain sensitive information such as user account name and password, which can expose that information through the browser's history, referrers, web logs, and other sources.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
ACTi Corporation | ACTi D, B, I, and E series cameras |
Version: A1D-500-V6.11.31-AC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:16:28.235Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://twitter.com/hack3rsca/status/839599437907386368" }, { "name": "96720", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/96720/info" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://twitter.com/Hfuhs/status/839252357221330944" }, { "name": "VU#355151", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/355151" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ACTi D, B, I, and E series cameras", "vendor": "ACTi Corporation", "versions": [ { "status": "affected", "version": "A1D-500-V6.11.31-AC" } ] } ], "datePublic": "2017-03-07T00:00:00", "descriptions": [ { "lang": "en", "value": "ACTi cameras including the D, B, I, and E series using firmware version A1D-500-V6.11.31-AC have a web application that uses the GET method to process requests that contain sensitive information such as user account name and password, which can expose that information through the browser\u0027s history, referrers, web logs, and other sources." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-598", "description": "CWE-598: Information Exposure Through Query Strings in GET Request", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-15T13:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://twitter.com/hack3rsca/status/839599437907386368" }, { "name": "96720", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/96720/info" }, { "tags": [ "x_refsource_MISC" ], "url": "https://twitter.com/Hfuhs/status/839252357221330944" }, { "name": "VU#355151", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/355151" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2017-3185", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ACTi D, B, I, and E series cameras", "version": { "version_data": [ { "version_value": "A1D-500-V6.11.31-AC" } ] } } ] }, "vendor_name": "ACTi Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ACTi cameras including the D, B, I, and E series using firmware version A1D-500-V6.11.31-AC have a web application that uses the GET method to process requests that contain sensitive information such as user account name and password, which can expose that information through the browser\u0027s history, referrers, web logs, and other sources." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-598: Information Exposure Through Query Strings in GET Request" } ] } ] }, "references": { "reference_data": [ { "name": "https://twitter.com/hack3rsca/status/839599437907386368", "refsource": "MISC", "url": "https://twitter.com/hack3rsca/status/839599437907386368" }, { "name": "96720", "refsource": "BID", "url": "http://www.securityfocus.com/bid/96720/info" }, { "name": "https://twitter.com/Hfuhs/status/839252357221330944", "refsource": "MISC", "url": "https://twitter.com/Hfuhs/status/839252357221330944" }, { "name": "VU#355151", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/355151" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2017-3185", "datePublished": "2017-12-15T14:00:00", "dateReserved": "2016-12-05T00:00:00", "dateUpdated": "2024-08-05T14:16:28.235Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2017-12-16 02:29
Modified
2025-04-20 01:37
Severity ?
Summary
ACTi cameras including the D, B, I, and E series using firmware version A1D-500-V6.11.31-AC have a web application that uses the GET method to process requests that contain sensitive information such as user account name and password, which can expose that information through the browser's history, referrers, web logs, and other sources.
References
▶ | URL | Tags | |
---|---|---|---|
cret@cert.org | http://www.securityfocus.com/bid/96720/info | Third Party Advisory, VDB Entry | |
cret@cert.org | https://twitter.com/Hfuhs/status/839252357221330944 | Press/Media Coverage, Third Party Advisory | |
cret@cert.org | https://twitter.com/hack3rsca/status/839599437907386368 | Press/Media Coverage, Third Party Advisory | |
cret@cert.org | https://www.kb.cert.org/vuls/id/355151 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/96720/info | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://twitter.com/Hfuhs/status/839252357221330944 | Press/Media Coverage, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://twitter.com/hack3rsca/status/839599437907386368 | Press/Media Coverage, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/355151 | Third Party Advisory, US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acti | camera_firmware | a1d-500-v6.11.31-ac |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:acti:camera_firmware:a1d-500-v6.11.31-ac:*:*:*:*:*:*:*", "matchCriteriaId": "C7A530FE-C83D-4CAA-9C23-8C9A8F96B34A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ACTi cameras including the D, B, I, and E series using firmware version A1D-500-V6.11.31-AC have a web application that uses the GET method to process requests that contain sensitive information such as user account name and password, which can expose that information through the browser\u0027s history, referrers, web logs, and other sources." }, { "lang": "es", "value": "Las c\u00e1maras ACTi, incluidas las series D, B, I y E, que utilizan la versi\u00f3n de firmware A1D-500-V6.11.31-AC tienen una aplicaci\u00f3n web que utiliza el m\u00e9todo GET para procesar peticiones que contienen informaci\u00f3n sensible como el nombre de la cuenta y la contrase\u00f1a del usuario, lo que puede exponer esa informaci\u00f3n mediante el historial del navegador, referers, logs web y otros or\u00edgenes." } ], "id": "CVE-2017-3185", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-12-16T02:29:10.137", "references": [ { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/96720/info" }, { "source": "cret@cert.org", "tags": [ "Press/Media Coverage", "Third Party Advisory" ], "url": "https://twitter.com/Hfuhs/status/839252357221330944" }, { "source": "cret@cert.org", "tags": [ "Press/Media Coverage", "Third Party Advisory" ], "url": "https://twitter.com/hack3rsca/status/839599437907386368" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/355151" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/96720/info" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Press/Media Coverage", "Third Party Advisory" ], "url": "https://twitter.com/Hfuhs/status/839252357221330944" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Press/Media Coverage", "Third Party Advisory" ], "url": "https://twitter.com/hack3rsca/status/839599437907386368" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/355151" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-598" } ], "source": "cret@cert.org", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-12-16 02:29
Modified
2025-04-20 01:37
Severity ?
Summary
ACTi cameras including the D, B, I, and E series using firmware version A1D-500-V6.11.31-AC use non-random default credentials across all devices. A remote attacker can take complete control of a device using default admin credentials.
References
▶ | URL | Tags | |
---|---|---|---|
cret@cert.org | http://www.securityfocus.com/bid/96720/info | Third Party Advisory, VDB Entry | |
cret@cert.org | https://twitter.com/Hfuhs/status/839252357221330944 | Press/Media Coverage | |
cret@cert.org | https://twitter.com/hack3rsca/status/839599437907386368 | Press/Media Coverage | |
cret@cert.org | https://www.kb.cert.org/vuls/id/355151 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/96720/info | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://twitter.com/Hfuhs/status/839252357221330944 | Press/Media Coverage | |
af854a3a-2127-422b-91ae-364da2661108 | https://twitter.com/hack3rsca/status/839599437907386368 | Press/Media Coverage | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/355151 | Third Party Advisory, US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acti | camera_firmware | a1d-500-v6.11.31-ac |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:acti:camera_firmware:a1d-500-v6.11.31-ac:*:*:*:*:*:*:*", "matchCriteriaId": "C7A530FE-C83D-4CAA-9C23-8C9A8F96B34A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ACTi cameras including the D, B, I, and E series using firmware version A1D-500-V6.11.31-AC use non-random default credentials across all devices. A remote attacker can take complete control of a device using default admin credentials." }, { "lang": "es", "value": "Las c\u00e1maras ACTi, incluidas las series D, B, I y E, que utilizan la versi\u00f3n de firmware A1D-500-V6.11.31-AC usan credenciales por defecto no aleatorias en todos los dispositivos. Un atacante remoto puede tomar el control total de un dispositivo que est\u00e9 utilizando credenciales de administrador por defecto." } ], "id": "CVE-2017-3186", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-12-16T02:29:10.183", "references": [ { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/96720/info" }, { "source": "cret@cert.org", "tags": [ "Press/Media Coverage" ], "url": "https://twitter.com/Hfuhs/status/839252357221330944" }, { "source": "cret@cert.org", "tags": [ "Press/Media Coverage" ], "url": "https://twitter.com/hack3rsca/status/839599437907386368" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/355151" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/96720/info" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Press/Media Coverage" ], "url": "https://twitter.com/Hfuhs/status/839252357221330944" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Press/Media Coverage" ], "url": "https://twitter.com/hack3rsca/status/839599437907386368" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/355151" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-521" } ], "source": "cret@cert.org", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-798" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-12-16 02:29
Modified
2025-04-20 01:37
Severity ?
Summary
ACTi cameras including the D, B, I, and E series using firmware version A1D-500-V6.11.31-AC fail to properly restrict access to the factory reset page. An unauthenticated, remote attacker can exploit this vulnerability by directly accessing the http://x.x.x.x/setup/setup_maintain_firmware-default.html page. This will allow an attacker to perform a factory reset on the device, leading to a denial of service condition or the ability to make use of default credentials (CVE-2017-3186).
References
▶ | URL | Tags | |
---|---|---|---|
cret@cert.org | http://www.securityfocus.com/bid/96720/info | Third Party Advisory, VDB Entry | |
cret@cert.org | https://twitter.com/Hfuhs/status/839252357221330944 | Press/Media Coverage, Third Party Advisory | |
cret@cert.org | https://twitter.com/hack3rsca/status/839599437907386368 | Press/Media Coverage, Third Party Advisory | |
cret@cert.org | https://www.kb.cert.org/vuls/id/355151 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/96720/info | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://twitter.com/Hfuhs/status/839252357221330944 | Press/Media Coverage, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://twitter.com/hack3rsca/status/839599437907386368 | Press/Media Coverage, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/355151 | Third Party Advisory, US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acti | camera_firmware | a1d-500-v6.11.31-ac |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:acti:camera_firmware:a1d-500-v6.11.31-ac:*:*:*:*:*:*:*", "matchCriteriaId": "C7A530FE-C83D-4CAA-9C23-8C9A8F96B34A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ACTi cameras including the D, B, I, and E series using firmware version A1D-500-V6.11.31-AC fail to properly restrict access to the factory reset page. An unauthenticated, remote attacker can exploit this vulnerability by directly accessing the http://x.x.x.x/setup/setup_maintain_firmware-default.html page. This will allow an attacker to perform a factory reset on the device, leading to a denial of service condition or the ability to make use of default credentials (CVE-2017-3186)." }, { "lang": "es", "value": "Las c\u00e1maras ACTi (incluyendo series D, B, I y E) con firmware versi\u00f3n A1D-500-V6.11.31-AC no restringen correctamente el acceso a la p\u00e1gina de restablecimiento de f\u00e1brica. Un atacante remoto no autenticado puede explotar esta vulnerabilidad accediendo directamente a la p\u00e1gina http://x.x.x.x/setup/setup_maintain_firmware-default.html. Esto permitir\u00e1 que un atacante realice un restablecimiento de f\u00e1brica en el dispositivo, que conducir\u00e1 a una denegaci\u00f3n de servicio (DoS) o a la capacidad de utilizar las credenciales por defecto (CVE-2017-3186)." } ], "id": "CVE-2017-3184", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-12-16T02:29:10.090", "references": [ { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/96720/info" }, { "source": "cret@cert.org", "tags": [ "Press/Media Coverage", "Third Party Advisory" ], "url": "https://twitter.com/Hfuhs/status/839252357221330944" }, { "source": "cret@cert.org", "tags": [ "Press/Media Coverage", "Third Party Advisory" ], "url": "https://twitter.com/hack3rsca/status/839599437907386368" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/355151" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/96720/info" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Press/Media Coverage", "Third Party Advisory" ], "url": "https://twitter.com/Hfuhs/status/839252357221330944" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Press/Media Coverage", "Third Party Advisory" ], "url": "https://twitter.com/hack3rsca/status/839599437907386368" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/355151" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "cret@cert.org", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-798" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }