3 results (0.002 seconds)

CVSS: 8.0EPSS: 0%CPEs: 4EXPL: 0

An Elevated Privileges issue exists in D-Link DCS-5000L v1.05 and DCS-932L v2.17 and older. The use of the digest-authentication for the devices command interface may allow further attack vectors that may compromise the cameras configuration and allow malicious users on the LAN to access the device. NOTE: This vulnerability only affects products that are no longer supported by the maintainer Un problema de privilegios elevados se presenta en D-Link DCS-5000L versión v1.05 y DCS-932L versión v2.17 y anteriores. El uso de la autenticación digest para la interfaz de comandos de los dispositivos puede permitir otros vectores de ataque que pueden comprometer la configuración de las cámaras y permitir que usuarios maliciosos en la LAN accedan al dispositivo. NOTA: Esta vulnerabilidad sólo afecta a los productos que ya no son soportados por el mantenedor. • https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10247 https://www.dlink.com/en/security-bulletin •

CVSS: 8.0EPSS: 0%CPEs: 4EXPL: 0

DCS-5000L v1.05 and DCS-932L v2.17 and older are affecged by Incorrect Acess Control. The use of the basic authentication for the devices command interface allows attack vectors that may compromise the cameras configuration and allow malicious users on the LAN to access the device. NOTE: This vulnerability only affects products that are no longer supported by the maintainer DCS-5000L versión v1.05 y DCS-932L versión v2.17 y anteriores, están afectados por un Control de Acceso Incorrecto. El uso de la autenticación básica para la interfaz de comandos de los dispositivos permite vectores de ataque que pueden comprometer la configuración de las cámaras y permitir que usuarios maliciosos en la LAN accedan al dispositivo. NOTA: Esta vulnerabilidad sólo afecta a los productos que ya no son soportados por el mantenedor. • https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10247 https://www.dlink.com/en/security-bulletin • CWE-287: Improper Authentication •

CVSS: 8.8EPSS: 0%CPEs: 62EXPL: 2

D-Link DCS cameras have a weak/insecure CrossDomain.XML file that allows sites hosting malicious Flash objects to access and/or change the device's settings via a CSRF attack. This is because of the 'allow-access-from domain' child element set to *, thus accepting requests from any domain. If a victim logged into the camera's web console visits a malicious site hosting a malicious Flash file from another Browser tab, the malicious Flash file then can send requests to the victim's DCS series Camera without knowing the credentials. An attacker can host a malicious Flash file that can retrieve Live Feeds or information from the victim's DCS series Camera, add new admin users, or make other changes to the device. Known affected devices are DCS-933L with firmware before 1.13.05, DCS-5030L, DCS-5020L, DCS-2530L, DCS-2630L, DCS-930L, DCS-932L, and DCS-932LB1. • https://www.exploit-db.com/exploits/42074 https://www.qualys.com/2017/02/22/qsa-2017-02-22/qsa-2017-02-22.pdf • CWE-352: Cross-Site Request Forgery (CSRF) •