fkie_cve-2019-9682
Vulnerability from fkie_nvd
Published
2020-05-13 16:15
Modified
2024-11-21 04:52
Severity ?
Summary
Dahua devices with Build time before December 2019 use strong security login mode by default, but in order to be compatible with the normal login of early devices, some devices retain the weak security login mode that users can control. If the user uses a weak security login method, an attacker can monitor the device network to intercept network packets to attack the device. So it is recommended that the user disable this login method.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:sd6al_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1CE773D-CA5F-483C-B20C-DAD30A590DDD", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:sd6al:-:*:*:*:*:*:*:*", "matchCriteriaId": "C35F4371-334B-4EA8-8F48-498C81652F7C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:sd5a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "083AE420-CAF9-4A2A-8C76-79DD590FA191", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:sd5a:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EE24474-EF35-4475-99DD-4B54D6AF0B2D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:sd1a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A075994-60D1-40B7-9EF6-8048CBC18764", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:sd1a:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A3C5893-E1D0-4E06-9F7F-058B657E4493", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ptz1a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F78D2E9E-9909-4130-A146-CA861F7DF341", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ptz1a:-:*:*:*:*:*:*:*", "matchCriteriaId": "19B57B9D-0729-48E0-892B-E39AE1F89AB4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:sd50_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "18CD222C-C95A-4D5E-A763-5D2F74EAEC04", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:sd50:-:*:*:*:*:*:*:*", "matchCriteriaId": "984AD4D5-D689-4150-A1EE-D48B81CBB7C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:sd52c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0ECBC0BF-171E-49FD-B6AF-CC7B29D39FB7", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:sd52c:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BA0D206-5BE7-4592-8D3E-641F47164770", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hx5842h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E8CB654-0526-4E7A-8984-8350B39BB4DF", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hx5842h:-:*:*:*:*:*:*:*", "matchCriteriaId": "724F4B7D-C8C1-4914-B1D6-B4CB9B1F4093", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hx7842h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AEBFC1D-9F25-4FDB-A191-D7D6C1C6E234", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hx7842h:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D6E27D8-C608-49E7-8284-5196EDB428DB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hx2xxx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A046C7EA-F954-4F36-9ED3-DBA84F1FB2D3", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hx2xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B8887C8-C335-4EBB-BC7F-D4F8D8205DAE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hxxx5x4x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCD8DCD2-5CEA-420F-860C-11B469D9FF8F", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hxxx5x4x:-:*:*:*:*:*:*:*", "matchCriteriaId": "F051A1A0-E841-42E7-92A3-E45E4017DCDE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n42b1p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F092AA97-7184-4499-BB83-D6204BD4621B", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n42b1p:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCB3A7FD-63A2-423C-912F-E2E5B4690CF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n42b2p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "855B3C5F-CE9D-4FFA-B485-11A8D675F006", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n42b2p:-:*:*:*:*:*:*:*", "matchCriteriaId": "83B0FAFA-BEF4-4196-A4BC-4CFD6DCF4986", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n42b3p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D0E03DE-1BFA-43AD-9AC6-72A1A1545D4B", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n42b3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B51E9FED-4929-42CC-AA6F-BFF61E8F88C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n52a4p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F20B6467-53DC-4DC6-BCC2-6B6B33ABD65D", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n52a4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB41CE1D-1A97-4549-A849-D06F78858CA3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n54a4p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFA91720-5AE4-48B6-A940-A4DBE650591D", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n54a4p:-:*:*:*:*:*:*:*", "matchCriteriaId": "D479D171-7F30-4D6B-8A49-0A3967103B94", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n52b2p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ACD4FD87-1D74-4895-AA89-D26541A55433", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n52b2p:-:*:*:*:*:*:*:*", "matchCriteriaId": "7936F0A3-F6DF-47B2-898E-DBE68B369633", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n52b5p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D5136C6-2355-4782-BF9C-0874DC5B0CDA", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n52b5p:-:*:*:*:*:*:*:*", "matchCriteriaId": "195D7533-B2EF-4BC2-B6D6-0B141FB90090", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n52b3p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7180D6E1-6F7F-4EAD-BD51-02C029EFB034", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n52b3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "03D1AD58-447D-4D30-B9CF-48B5CB743C2B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:n54b2p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEC0287A-824B-46D0-84AB-54BEEF90E16B", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:n54b2p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5667962D-1A47-4D77-95A4-6B34F8863761", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hdbw1320e-w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CBF6051-B1DF-4028-ADC1-CF3820C1CA71", "versionEndExcluding": "2019-12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hdbw1320e-w:-:*:*:*:*:*:*:*", "matchCriteriaId": "F221BD07-E754-4355-B031-A95147905815", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dahua devices with Build time before December 2019 use strong security login mode by default, but in order to be compatible with the normal login of early devices, some devices retain the weak security login mode that users can control. If the user uses a weak security login method, an attacker can monitor the device network to intercept network packets to attack the device. So it is recommended that the user disable this login method." }, { "lang": "es", "value": "Los dispositivos Dahua con tiempo de Compilaci\u00f3n antes de diciembre de 2019, usan un modo de inicio de sesi\u00f3n de seguridad fuerte por defecto, pero en funci\u00f3n de ser compatibles con el inicio de sesi\u00f3n normal de los primeros dispositivos, algunos dispositivos conservan el modo de inicio de sesi\u00f3n de seguridad d\u00e9bil que los usuarios pueden controlar. Si el usuario usa un m\u00e9todo de inicio de sesi\u00f3n de seguridad d\u00e9bil, un atacante puede monitorear la red del dispositivo para interceptar los paquetes de red para atacar el dispositivo. Por lo tanto, es recomendado que el usuario desactive este m\u00e9todo de inicio de sesi\u00f3n." } ], "id": "CVE-2019-9682", "lastModified": "2024-11-21T04:52:06.380", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-05-13T16:15:12.870", "references": [ { "source": "cybersecurity@dahuatech.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dahuasecurity.com/support/cybersecurity/details/767" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.dahuasecurity.com/support/cybersecurity/details/767" } ], "sourceIdentifier": "cybersecurity@dahuatech.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…