{"uuid": "8cb5ff1f-4a8b-4941-9efd-391f797ecc11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-20461", "type": "seen", "source": "https://t.me/cvedetector/10132", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2019-20461 - Vulnerability Title: Alecto IVM-100 Remote Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2019-20461 \nPublished : Nov. 7, 2024, 9:15 p.m. | 22\u00a0minutes ago \nDescription : An issue was discovered on Alecto IVM-100 2019-11-12 devices. The device uses a custom UDP protocol to start and control video and audio services. The protocol has been partially reverse engineered. Based upon the reverse engineering, no password or username is ever transferred over this protocol. Thus, one can set up the camera connection feed with only the encoded UID. It is possible to set up sessions with the camera over the Internet by using the encoded UID and the custom UDP protocol, because authentication happens at the client side. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-07T22:47:40.000000Z"}