Page 8 of 51 results (0.013 seconds)

CVSS: 9.8EPSS: 0%CPEs: 50EXPL: 0

Customer of Dahua IP camera or IP PTZ could submit relevant device information to receive a time limited temporary password from Dahua authorized dealer to reset the admin password. The algorithm used in this mechanism is potentially at risk of being compromised and subsequently utilized by attacker. >Los clientes de las cámaras Dahua IP o IP PTZ podrían enviar información relevante del dispositivo para recibir una contraseña temporal limitada temporalmente por un distribuidor autorizado de Dahua para restablecer la contraseña de administrador. El algoritmo empleado en este mecanismo está potencialmente en riesgo de verse comprometido y, consecuentemente, empleado por el atacante. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Dahua Technology IP Camera. • http://www.dahuasecurity.com/annoucementsingle/security-advisory--admin-password-recovery-mechanism-in-some-dahua-ip-camera-and-ip-ptz-could-lead-to-security-risk_14731_221.html •

CVSS: 6.5EPSS: 0%CPEs: 42EXPL: 0

Firmware upgrade authentication bypass vulnerability was found in Dahua IPC-HDW4300S and some IP products. The vulnerability was caused by internal Debug function. This particular function was used for problem analysis and performance tuning during product development phase. It allowed the device to receive only specific data (one direction, no transmit) and therefore it was not involved in any instance of collecting user privacy data or allowing remote code execution. Se ha encontrado una vulnerabilidad de omisión de autenticación de actualización de firmware en Dahua IPC-HDW4300S y algunos productos IP. • http://www.dahuasecurity.com/annoucementsingle/security-advisory--high-risk-vulnerability-found-in-dahua-ipc-hdw4300s-and-some-ip-products_14731_231.html • CWE-287: Improper Authentication •

CVSS: 8.8EPSS: 0%CPEs: 44EXPL: 0

Authentication vulnerability found in Dahua NVR models NVR50XX, NVR52XX, NVR54XX, NVR58XX with software before DH_NVR5xxx_Eng_P_V2.616.0000.0.R.20171102. Attacker could exploit this vulnerability to gain access to additional operations by means of forging json message. Se ha encontrado una vulnerabilidad de autenticación en Dahua NVR, modelos NVR50XX, NVR52XX, NVR54XX y NVR58XX con software anterior a DH_NVR5xxx_Eng_P_V2.616.0000.0.R.20171102. Un atacante podría explotar esta vulnerabilidad para obtener acceso a operaciones adicionales por medio de la falsificación de un mensaje json. • http://www.dahuasecurity.com/annoucementsingle/security-advisory--authentication-vulnerability-found-in-some-dahua-nvr_14731_211.html • CWE-287: Improper Authentication •

CVSS: 9.8EPSS: 32%CPEs: 30EXPL: 0

A Password in Configuration File issue was discovered in Dahua DH-IPC-HDBW23A0RN-ZS, DH-IPC-HDBW13A0SN, DH-IPC-HDW1XXX, DH-IPC-HDW2XXX, DH-IPC-HDW4XXX, DH-IPC-HFW1XXX, DH-IPC-HFW2XXX, DH-IPC-HFW4XXX, DH-SD6CXX, DH-NVR1XXX, DH-HCVR4XXX, DH-HCVR5XXX, DHI-HCVR51A04HE-S3, DHI-HCVR51A08HE-S3, and DHI-HCVR58A32S-S2 devices. The password in configuration file vulnerability was identified, which could lead to a malicious user assuming the identity of a privileged user and gaining access to sensitive information. Se detectó un problema de Contraseña en el Archivo de Configuración en cámaras DH-IPC-HDBW23A0RN-ZS, DH-IPC-HDBW13A0SN, DH-IPC-HDW1XXX, DH-IPC-HDW2XXX, DH-IPC-HDW4XXX, DH-IPC-HFW1XXX, DH-IPC-HFW2XXX, DH-IPC-HFW4XXX, DH-SD6CXX, DH-NVR1XXX, DH-HCVR4XXX, DH-HCVR5XXX, DHI-HCVR51A04HE-S3, DHI-HCVR51A08HE-S3 y DHI-HCVR58A32S-S2, de Dahua . Se identificó una vulnerabilidad de contraseña en el archivo de configuración, lo que podría conllevar a un usuario malicioso a asumir la identidad de un usuario con privilegios y conseguir acceso a información confidencial. • http://us.dahuasecurity.com/en/us/Security-Bulletin_030617.php http://www.securityfocus.com/bid/98312 https://ics-cert.us-cert.gov/advisories/ICSA-17-124-02 • CWE-260: Password in Configuration File CWE-522: Insufficiently Protected Credentials •

CVSS: 7.5EPSS: 3%CPEs: 30EXPL: 0

A Use of Password Hash Instead of Password for Authentication issue was discovered in Dahua DH-IPC-HDBW23A0RN-ZS, DH-IPC-HDBW13A0SN, DH-IPC-HDW1XXX, DH-IPC-HDW2XXX, DH-IPC-HDW4XXX, DH-IPC-HFW1XXX, DH-IPC-HFW2XXX, DH-IPC-HFW4XXX, DH-SD6CXX, DH-NVR1XXX, DH-HCVR4XXX, DH-HCVR5XXX, DHI-HCVR51A04HE-S3, DHI-HCVR51A08HE-S3, and DHI-HCVR58A32S-S2 devices. The use of password hash instead of password for authentication vulnerability was identified, which could allow a malicious user to bypass authentication without obtaining the actual password. Un problema de Uso del Hash de Contraseña en Lugar de Contraseña para Autenticación se detectó en cámaras DH-IPC-HDBW23A0RN-ZS, DH-IPC-HDBW13A0SN, DH-IPC-HDW1XXX, DH-IPC-HDW2XXX, DH-IPC-HDW4XXX, DH-IPC-HFW1XXX, DH-IPC-HFW2XXX, DH-IPC-HFW4XXX, DH-SD6CXX, DH-NVR1XXX, DH-HCVR4XXX, DH-HCVR5XXX, DHI-HCVR51A04HE-S3, DHI-HCVR51A08HE-S3 y DHI-HCVR58A32S-S2, de Dahua. Se identificó el uso de hash de contraseña en lugar de la contraseña para la vulnerabilidad de autenticación, lo que podría permitir a un usuario malicioso omitir la autenticación sin obtener la contraseña actual. • http://us.dahuasecurity.com/en/us/Security-Bulletin_030617.php http://www.securityfocus.com/bid/98312 https://ics-cert.us-cert.gov/advisories/ICSA-17-124-02 • CWE-798: Use of Hard-coded Credentials CWE-836: Use of Password Hash Instead of Password for Authentication •