Vulnerabilites related to dahuasecurity - ipc-hdbw5xxx_firmware
CVE-2017-9315 (GCVE-0-2017-9315)
Vulnerability from cvelistv5
Published
2017-11-28 19:00
Modified
2024-09-17 02:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- risk of sensitive information leakage
Summary
Customer of Dahua IP camera or IP PTZ could submit relevant device information to receive a time limited temporary password from Dahua authorized dealer to reset the admin password. The algorithm used in this mechanism is potentially at risk of being compromised and subsequently utilized by attacker.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T17:02:44.242Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.dahuasecurity.com/annoucementsingle/security-advisory--admin-password-recovery-mechanism-in-some-dahua-ip-camera-and-ip-ptz-could-lead-to-security-risk_14731_221.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Dahua IP Camera and IP PTZ IPC-HFW1XXX, IPC-HDW1XXX, IPC-HDBW1XXX, IPC-HFW2XXX, IPC-HDW2XXX, IPC-HDBW2XXX, IPC-HFW4XXX, IPC-HDW4XXX, IPC-HDBW4XXX, IPC-HF5XXX, IPC-HFW5XXX, IPC-HDW5XXX, IPC-HDBW5XXX, IPC-HF8XXX, IPC-HFW8XXX, IPC-HDBW8XXX, IPC-EBW8XXX, IPC-PFW8xxx, IPC-PDBW8xxx, IPC-HUM8xxx, PSD8xxxx, DH-SD2XXXXX, DH-SD4XXXXX, DH-SD5XXXXX, DH-SD6XXXXX", "vendor": "Dahua Technologies", "versions": [ { "status": "affected", "version": "Versions Build between 2015/07 and 2017/03" } ] } ], "datePublic": "2017-11-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Customer of Dahua IP camera or IP PTZ could submit relevant device information to receive a time limited temporary password from Dahua authorized dealer to reset the admin password. The algorithm used in this mechanism is potentially at risk of being compromised and subsequently utilized by attacker." } ], "problemTypes": [ { "descriptions": [ { "description": "risk of sensitive information leakage", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-28T18:57:01", "orgId": "79ee569e-7d1e-4364-98f0-3a18e2a739ad", "shortName": "dahua" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.dahuasecurity.com/annoucementsingle/security-advisory--admin-password-recovery-mechanism-in-some-dahua-ip-camera-and-ip-ptz-could-lead-to-security-risk_14731_221.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cybersecurity@dahuatech.com", "DATE_PUBLIC": "2017-11-10T00:00:00", "ID": "CVE-2017-9315", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Dahua IP Camera and IP PTZ IPC-HFW1XXX, IPC-HDW1XXX, IPC-HDBW1XXX, IPC-HFW2XXX, IPC-HDW2XXX, IPC-HDBW2XXX, IPC-HFW4XXX, IPC-HDW4XXX, IPC-HDBW4XXX, IPC-HF5XXX, IPC-HFW5XXX, IPC-HDW5XXX, IPC-HDBW5XXX, IPC-HF8XXX, IPC-HFW8XXX, IPC-HDBW8XXX, IPC-EBW8XXX, IPC-PFW8xxx, IPC-PDBW8xxx, IPC-HUM8xxx, PSD8xxxx, DH-SD2XXXXX, DH-SD4XXXXX, DH-SD5XXXXX, DH-SD6XXXXX", "version": { "version_data": [ { "version_value": "Versions Build between 2015/07 and 2017/03" } ] } } ] }, "vendor_name": "Dahua Technologies" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Customer of Dahua IP camera or IP PTZ could submit relevant device information to receive a time limited temporary password from Dahua authorized dealer to reset the admin password. The algorithm used in this mechanism is potentially at risk of being compromised and subsequently utilized by attacker." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "risk of sensitive information leakage" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.dahuasecurity.com/annoucementsingle/security-advisory--admin-password-recovery-mechanism-in-some-dahua-ip-camera-and-ip-ptz-could-lead-to-security-risk_14731_221.html", "refsource": "CONFIRM", "url": "http://www.dahuasecurity.com/annoucementsingle/security-advisory--admin-password-recovery-mechanism-in-some-dahua-ip-camera-and-ip-ptz-could-lead-to-security-risk_14731_221.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "79ee569e-7d1e-4364-98f0-3a18e2a739ad", "assignerShortName": "dahua", "cveId": "CVE-2017-9315", "datePublished": "2017-11-28T19:00:00Z", "dateReserved": "2017-05-30T00:00:00", "dateUpdated": "2024-09-17T02:31:08.983Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-9317 (GCVE-0-2017-9317)
Vulnerability from cvelistv5
Published
2018-05-23 15:00
Modified
2024-09-16 19:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Privilege escalation
Summary
Privilege escalation vulnerability found in some Dahua IP devices. Attacker in possession of low privilege account can gain access to credential information of high privilege account and further obtain device information or attack the device.
References
▼ | URL | Tags |
---|---|---|
https://www.dahuasecurity.com/support/cybersecurity/annoucementNotice/337 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dahua Technologies | XVR 5x04, XVR 5x08, XVR 5x16, XVR 7x16, IPC-HDBW4XXX, IPC-HDBW5XXX |
Version: Build before 2017/09 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T17:02:44.373Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.dahuasecurity.com/support/cybersecurity/annoucementNotice/337" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "XVR 5x04, XVR 5x08, XVR 5x16, XVR 7x16, IPC-HDBW4XXX, IPC-HDBW5XXX", "vendor": "Dahua Technologies", "versions": [ { "status": "affected", "version": "Build before 2017/09" } ] } ], "datePublic": "2018-03-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Privilege escalation vulnerability found in some Dahua IP devices. Attacker in possession of low privilege account can gain access to credential information of high privilege account and further obtain device information or attack the device." } ], "problemTypes": [ { "descriptions": [ { "description": "Privilege escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-05-23T14:57:01", "orgId": "79ee569e-7d1e-4364-98f0-3a18e2a739ad", "shortName": "dahua" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.dahuasecurity.com/support/cybersecurity/annoucementNotice/337" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cybersecurity@dahuatech.com", "DATE_PUBLIC": "2018-03-16T00:00:00", "ID": "CVE-2017-9317", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "XVR 5x04, XVR 5x08, XVR 5x16, XVR 7x16, IPC-HDBW4XXX, IPC-HDBW5XXX", "version": { "version_data": [ { "version_value": "Build before 2017/09" } ] } } ] }, "vendor_name": "Dahua Technologies" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Privilege escalation vulnerability found in some Dahua IP devices. Attacker in possession of low privilege account can gain access to credential information of high privilege account and further obtain device information or attack the device." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Privilege escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.dahuasecurity.com/support/cybersecurity/annoucementNotice/337", "refsource": "CONFIRM", "url": "https://www.dahuasecurity.com/support/cybersecurity/annoucementNotice/337" } ] } } } }, "cveMetadata": { "assignerOrgId": "79ee569e-7d1e-4364-98f0-3a18e2a739ad", "assignerShortName": "dahua", "cveId": "CVE-2017-9317", "datePublished": "2018-05-23T15:00:00Z", "dateReserved": "2017-05-30T00:00:00", "dateUpdated": "2024-09-16T19:36:50.725Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2018-05-23 15:29
Modified
2024-11-21 03:35
Severity ?
Summary
Privilege escalation vulnerability found in some Dahua IP devices. Attacker in possession of low privilege account can gain access to credential information of high privilege account and further obtain device information or attack the device.
References
▼ | URL | Tags | |
---|---|---|---|
cybersecurity@dahuatech.com | https://www.dahuasecurity.com/support/cybersecurity/annoucementNotice/337 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.dahuasecurity.com/support/cybersecurity/annoucementNotice/337 | Patch, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:xvr5x16_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "59E05D25-E22C-4239-9803-03C060886FA0", "versionEndExcluding": "3.218.0000002.1.r.171229", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:xvr5x16:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2330FA1-AE30-4B9D-981F-932C8FB9920A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:xvr5x08_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45D055D5-7BA3-4411-9127-05FCC31D01B2", "versionEndExcluding": "3.218.0000002.1.r.171229", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:xvr5x08:-:*:*:*:*:*:*:*", "matchCriteriaId": "B79EC839-5AE5-4F77-95D3-7CEB7464E88E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:xvr5x04_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63C550AC-0214-42FA-8ACF-8DC86F7FFADC", "versionEndExcluding": "3.218.0000002.1.r.171229", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:xvr5x04:-:*:*:*:*:*:*:*", "matchCriteriaId": "B81F3251-8E82-42B1-9F30-22DE149A9E30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:xvr7x16_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "04FF13D0-D69E-4393-AF26-ADD8F3B5F191", "versionEndExcluding": "3.218.0000002.1.r.171229", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:xvr7x16:-:*:*:*:*:*:*:*", "matchCriteriaId": "93F8EAB9-77A2-4BAA-A4A6-D0FE852D1A5C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hdbw4xxx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F9CD479-B6BB-402F-BFBB-FC0B647A2A03", "versionEndExcluding": "2.622.0000000.18.r.20171110", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hdbw4xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "5855375E-7076-4673-ABD6-68D52AC6E3AE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hdbw4xxx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "68159A96-4C1A-4606-AA79-5F8D7C827EF6", "versionEndExcluding": "2.621.0000.28.r.20170912", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hdbw4xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "5855375E-7076-4673-ABD6-68D52AC6E3AE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hdbw5xxx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C99060D8-BEB4-467E-B848-6933E562230D", "versionEndExcluding": "2.622.0000000.18.r.20171110", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hdbw5xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6A4F9A7-6E9E-4081-8028-3AF07BC3984C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hdbw5xxx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "159BC39A-E64C-46D6-85EB-4FA142DD45C8", "versionEndExcluding": "2.621.0000.28.r.20170912", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hdbw5xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6A4F9A7-6E9E-4081-8028-3AF07BC3984C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Privilege escalation vulnerability found in some Dahua IP devices. Attacker in possession of low privilege account can gain access to credential information of high privilege account and further obtain device information or attack the device." }, { "lang": "es", "value": "Se ha encontrado una vulnerabilidad de escalado de privilegios en algunos dispositivos Dahua IP. Un atacante en posesi\u00f3n de una cuenta con bajos privilegios puede obtener acceso a informaci\u00f3n de credenciales de una cuenta con altos privilegios y obtener informaci\u00f3n sobre el dispositivo o atacarlo." } ], "id": "CVE-2017-9317", "lastModified": "2024-11-21T03:35:49.613", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-05-23T15:29:00.207", "references": [ { "source": "cybersecurity@dahuatech.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.dahuasecurity.com/support/cybersecurity/annoucementNotice/337" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.dahuasecurity.com/support/cybersecurity/annoucementNotice/337" } ], "sourceIdentifier": "cybersecurity@dahuatech.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-11-28 19:29
Modified
2025-04-20 01:37
Severity ?
Summary
Customer of Dahua IP camera or IP PTZ could submit relevant device information to receive a time limited temporary password from Dahua authorized dealer to reset the admin password. The algorithm used in this mechanism is potentially at risk of being compromised and subsequently utilized by attacker.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hfw1xxx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE24E587-F024-434C-8896-963EF6365DFD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hfw1xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "95768203-C18D-48A4-ABFD-B0CBB1089542", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hdw1xxx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2744338-2C47-4AE2-A357-B111413DA3C9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hdw1xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B4B5CB1-F578-4A34-9134-909EB47A6A79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hdbw1xxx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3365390-933F-4C20-99E9-F37BF1801757", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hdbw1xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2F39A03-A875-42D4-9F7B-3C8304A47F75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hfw2xxx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B165D7E8-4076-44F2-AF5C-B080BB8DFC99", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hfw2xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "317F6509-E1DE-43B5-934C-12A922B41DDD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hdw2xxx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "384003F9-F87D-4E60-B30B-C46AB14CE0E6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hdw2xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB77CAA7-8DD8-40F2-9E51-F89684D6A529", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hdbw2xxx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD52A575-189E-45CD-8409-60FCFA9C9104", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hdbw2xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C1C5CFD-4478-4A4E-8EFC-831DC6D024A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hfw4xxx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFAF151C-A17E-4285-A67C-4BD0C92DC7BB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hfw4xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AFDC39A-E3C1-44F5-B7C8-DF8CADBFD164", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hdw4xxx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4505B8FD-484F-469B-A107-E19D6ACA370C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hdw4xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "48919159-9AB6-4E6C-9F52-3DA0C20AD311", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hdbw4xxx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D448B1-4DEA-417F-A481-8508EC93CE6D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hdbw4xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "5855375E-7076-4673-ABD6-68D52AC6E3AE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hf5xxx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF482D7C-2E93-484F-B2CF-83A1CD90391A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hf5xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FA32590-DDA8-4AF7-9726-3AE948169F2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hfw5xxx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "901EB778-1C4C-4263-B7BA-C23FA30F83FD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hfw5xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "21F950CB-744F-41FF-8AB9-B04D9DD98137", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hdw5xxx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DFCB56DD-7E27-497F-89F3-608FB0EEF1A8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hdw5xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F73AB75-CA0C-4637-833F-321E734379AD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hdbw5xxx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77CB6549-619B-4073-9285-4D814D5C41DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hdbw5xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6A4F9A7-6E9E-4081-8028-3AF07BC3984C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hf8xxx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8956722A-BBF6-4894-A54D-A30719023CE8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hf8xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8CCA2F9-11FA-4628-ABA5-BBDF2AD1B381", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hfw8xxx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B75682D0-F7CE-4C7A-A976-26FB9CB57C6E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hfw8xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "5CF4396B-731D-4974-A637-DB5DD6BBC118", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hdbw8xxx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "884D3DF3-D215-4F40-844E-EFDA911ECC4A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hdbw8xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "D317690B-8B4F-4AA6-ACFE-6AD0FBF83019", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-ebw8xxx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "897B0D4B-CFBB-48FB-8E0A-DC2E8AB2C9FA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-ebw8xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5974C7A-BDB8-4D70-839E-0610B4CF3ED5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-pfw8xxx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE9E916E-27B1-474F-B8A5-75648C47B10E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-pfw8xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "42A9D46F-B7AA-4676-81E3-270E1F75B2FF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:dh-sd2xxxxx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0B62AED-E282-4ABB-BE4C-0CA0B220B745", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:dh-sd2xxxxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A0121F6-C477-4807-A363-559D458DF338", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-pdbw8xxx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FEBCB12-C48A-48E3-BADC-796CEBF78D47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-pdbw8xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "9482CF5F-E64F-47BF-BC88-D031E954B574", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:ipc-hum8xxx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B85237D9-2BB8-4C90-A7F7-F4BDE0C8A023", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:ipc-hum8xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "59624353-3DC1-4836-8880-CC8C036400C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:psd8xxxx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A55BC8BF-6AEE-498B-8103-557678D6AAF1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:psd8xxxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4CC924F-869B-4441-AECC-62B6F86D6B7D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:dh-sd4xxxxx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "79A48D20-0206-4D9E-AB6F-5AB5F437012E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:dh-sd4xxxxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "072DC6D9-0089-4A4C-8457-D40E8C189930", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:dh-sd5xxxxx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "93D6FAE3-3FC2-4E60-98F9-9BE5B3C6001E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:dh-sd5xxxxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "88E0E2DE-11AB-4564-A2C9-A39467688379", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dahuasecurity:dh-sd6xxxxx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E998E1F-6DF3-49C7-9A03-9C2FCBA3FB23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dahuasecurity:dh-sd6xxxxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E9E2C4E-4D99-4CB7-B332-EACB5504A752", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Customer of Dahua IP camera or IP PTZ could submit relevant device information to receive a time limited temporary password from Dahua authorized dealer to reset the admin password. The algorithm used in this mechanism is potentially at risk of being compromised and subsequently utilized by attacker." }, { "lang": "es", "value": "\u003eLos clientes de las c\u00e1maras Dahua IP o IP PTZ podr\u00edan enviar informaci\u00f3n relevante del dispositivo para recibir una contrase\u00f1a temporal limitada temporalmente por un distribuidor autorizado de Dahua para restablecer la contrase\u00f1a de administrador. El algoritmo empleado en este mecanismo est\u00e1 potencialmente en riesgo de verse comprometido y, consecuentemente, empleado por el atacante." } ], "id": "CVE-2017-9315", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-11-28T19:29:00.400", "references": [ { "source": "cybersecurity@dahuatech.com", "tags": [ "Vendor Advisory" ], "url": "http://www.dahuasecurity.com/annoucementsingle/security-advisory--admin-password-recovery-mechanism-in-some-dahua-ip-camera-and-ip-ptz-could-lead-to-security-risk_14731_221.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.dahuasecurity.com/annoucementsingle/security-advisory--admin-password-recovery-mechanism-in-some-dahua-ip-camera-and-ip-ptz-could-lead-to-security-risk_14731_221.html" } ], "sourceIdentifier": "cybersecurity@dahuatech.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }