CVE-2024-41885
Hardcoding sensitive information
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Team ENVY, a Security Research TEAM has found a flaw that allows for a remote code execution on the NVR. The seed string for the encrypt key was hardcoding. The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds.
Team ENVY, un equipo de investigación de seguridad, ha encontrado una falla que permite la ejecución remota de código en el NVR. La cadena inicial para la clave de cifrado estaba codificada. El fabricante ha publicado un parche de firmware para la falla; consulte el informe del fabricante para obtener detalles y workarounds.
Team ENVY, a Security Research TEAM has found a flaw that allows for a remote code execution on the NVR. The seed string for the encrypt key was hardcoding. The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2024-07-23 CVE Reserved
- 2024-12-24 CVE Published
- 2024-12-24 CVE Updated
- 2024-12-25 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-547: Use of Hard-coded, Security-relevant Constants
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Hanwha Vision Co., Ltd. Search vendor "Hanwha Vision Co., Ltd." | XRN-420S Search vendor "Hanwha Vision Co., Ltd." for product "XRN-420S" | 5.01.62 Search vendor "Hanwha Vision Co., Ltd." for product "XRN-420S" and version "5.01.62" | en |
Affected
|