CVE-2021-33045 (GCVE-0-2021-33045)

Vulnerability from cvelistv5 – Published: 2021-09-15 21:50 – Updated: 2026-01-12 19:53
VLAI? CISA KEV
Summary
The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.
CWE
  • Improper Authentication
Assigner
Impacted products
Vendor Product Version
n/a Some Dahua IP Camera, Video Intercom, NVR, XVR devices Affected: Dahua IP Camera devices IPC-HX3XXX, IPC-HX5XXX, and IPC-HUM7XXX Buildtime before May, 2020, Video Intercom devices VTO75X95X, VTO65XXX, and VTH542XH, NVR devices NVR1XXX, NVR2XXX, NVR5XXX, and NVR6XX, XVR devices XVR4xxx, XVR5xxx, and XVR7xxx Buildtime before December, 2019.
CISA KEV
Known Exploited Vulnerability - GCVE BCP-07 Compliant

Vulnerability ID: CVE-2021-33045

Status: Confirmed

Status Updated: 2024-08-21 00:00 UTC

Exploited: Yes


Timestamps
First Seen: 2024-08-21
Asserted: 2024-08-21

Scope
Notes: KEV entry: Dahua IP Camera Authentication Bypass Vulnerability | Affected: Dahua / IP Camera Firmware | Description: Dahua IP cameras and related products contain an authentication bypass vulnerability when the loopback device is specified by the client during authentication. | Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Due date: 2024-09-11 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://www.dahuasecurity.com/aboutUs/trustedCenter/details/582; https://nvd.nist.gov/vuln/detail/CVE-2021-33045

Evidence

Type: Vendor Report

Signal: Successful Exploitation

Confidence: 80%

Source: cisa-kev


Details
Cwes CWE-287
Feed CISA Known Exploited Vulnerabilities Catalog
Product IP Camera Firmware
Due Date 2024-09-11
Date Added 2024-08-21
Vendorproject Dahua
Vulnerabilityname Dahua IP Camera Authentication Bypass Vulnerability
Knownransomwarecampaignuse Unknown

References

Created: 2026-02-02 12:26 UTC | Updated: 2026-02-06 07:17 UTC
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T23:42:19.573Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.dahuasecurity.com/support/cybersecurity/details/957"
          },
          {
            "name": "20211005 [Update]: Dahua Authentication bypass (CVE-2021-33044, CVE-2021-33045)",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2021/Oct/13"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/164423/Dahua-Authentication-Bypass.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 9.8,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "dateAdded": "2024-08-21",
                "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-33045"
              },
              "type": "kev"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2021-33045",
                "options": [
                  {
                    "Exploitation": "active"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-05T15:03:50.889187Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-287",
                "description": "CWE-287 Improper Authentication",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-01-12T19:53:51.321Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "government-resource"
            ],
            "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-33045"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Some Dahua IP Camera, Video Intercom, NVR, XVR devices",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Dahua IP Camera devices IPC-HX3XXX, IPC-HX5XXX, and IPC-HUM7XXX Buildtime before May, 2020, Video Intercom devices VTO75X95X, VTO65XXX, and VTH542XH, NVR devices NVR1XXX, NVR2XXX, NVR5XXX, and NVR6XX, XVR devices XVR4xxx, XVR5xxx, and XVR7xxx Buildtime before December, 2019."
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Improper Authentication",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-10-06T16:06:10.000Z",
        "orgId": "79ee569e-7d1e-4364-98f0-3a18e2a739ad",
        "shortName": "dahua"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.dahuasecurity.com/support/cybersecurity/details/957"
        },
        {
          "name": "20211005 [Update]: Dahua Authentication bypass (CVE-2021-33044, CVE-2021-33045)",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2021/Oct/13"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/164423/Dahua-Authentication-Bypass.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cybersecurity@dahuatech.com",
          "ID": "CVE-2021-33045",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Some Dahua IP Camera, Video Intercom, NVR, XVR devices",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Dahua IP Camera devices IPC-HX3XXX, IPC-HX5XXX, and IPC-HUM7XXX Buildtime before May, 2020, Video Intercom devices VTO75X95X, VTO65XXX, and VTH542XH, NVR devices NVR1XXX, NVR2XXX, NVR5XXX, and NVR6XX, XVR devices XVR4xxx, XVR5xxx, and XVR7xxx Buildtime before December, 2019."
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Improper Authentication"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.dahuasecurity.com/support/cybersecurity/details/957",
              "refsource": "MISC",
              "url": "https://www.dahuasecurity.com/support/cybersecurity/details/957"
            },
            {
              "name": "20211005 [Update]: Dahua Authentication bypass (CVE-2021-33044, CVE-2021-33045)",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2021/Oct/13"
            },
            {
              "name": "http://packetstormsecurity.com/files/164423/Dahua-Authentication-Bypass.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/164423/Dahua-Authentication-Bypass.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "79ee569e-7d1e-4364-98f0-3a18e2a739ad",
    "assignerShortName": "dahua",
    "cveId": "CVE-2021-33045",
    "datePublished": "2021-09-15T21:50:08.000Z",
    "dateReserved": "2021-05-17T00:00:00.000Z",
    "dateUpdated": "2026-01-12T19:53:51.321Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "cisa_known_exploited": {
      "cveID": "CVE-2021-33045",
      "cwes": "[\"CWE-287\"]",
      "dateAdded": "2024-08-21",
      "dueDate": "2024-09-11",
      "knownRansomwareCampaignUse": "Unknown",
      "notes": "https://www.dahuasecurity.com/aboutUs/trustedCenter/details/582; https://nvd.nist.gov/vuln/detail/CVE-2021-33045",
      "product": "IP Camera Firmware",
      "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
      "shortDescription": "Dahua IP cameras and related products contain an authentication bypass vulnerability when the loopback device is specified by the client during authentication.",
      "vendorProject": "Dahua",
      "vulnerabilityName": "Dahua IP Camera Authentication Bypass Vulnerability"
    },
    "fkie_nvd": {
      "cisaActionDue": "2024-09-11",
      "cisaExploitAdd": "2024-08-21",
      "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
      "cisaVulnerabilityName": "Dahua IP Camera Authentication Bypass Vulnerability",
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:ipc-hum7xxx_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.820.0000000.5.r.210705\", \"matchCriteriaId\": \"C0356805-3ECF-4C6F-B2BF-95D507736C44\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:ipc-hum7xxx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AE9ACB0-4CB3-4CF5-A007-15EE977D782E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:ipc-hx3xxx_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.800.0000000.29.r.210630\", \"matchCriteriaId\": \"E0D17050-41CA-4808-8ED3-F332FD00B551\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:ipc-hx3xxx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8936A118-4AB5-4B09-A9FD-E624A68315BD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:ipc-hx5xxx_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.820.0000000.5.r.210705\", \"matchCriteriaId\": \"3F20DC69-B735-4547-826D-E4C42A39FE82\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:ipc-hx5xxx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2838BDA-97FF-498E-BC81-955D31B9227A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:nvr-1xxx_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.001.0000005.1.r.210709\", \"matchCriteriaId\": \"FA1C3935-C83B-4A1A-BEEE-EF93F7722972\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:nvr-1xxx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7780D1BE-ABE0-4890-B493-36FA0A4B3266\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:nvr-2xxx_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.001.0000000.1.r.210710\", \"matchCriteriaId\": \"795EF8B2-5E6D-46EB-9F66-85F2C71B2619\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:nvr-2xxx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"89E3F7B3-3C51-49C1-BAEC-DA4235D5A06D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:nvr-4xxx_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.001.0000005.1.r.210713\", \"matchCriteriaId\": \"1386662B-C3DE-467A-8F41-F18BDE7B9726\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:nvr-4xxx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"58ECDC49-09D4-4E62-AC11-E3C52C656A9D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:nvr-5xxx_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.001.0000000.0.r.210710\", \"matchCriteriaId\": \"06A6B28A-2E0D-4E45-904A-66FEE5D85262\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:nvr-5xxx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE621958-8AE2-44E0-9E41-94BC964CDF57\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:nvr-6xx_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.001.0000001.1.r.210716\", \"matchCriteriaId\": \"90D5A1B3-88D5-4E5E-A88B-59409D41956C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:nvr-6xx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9EEAC798-870E-4DE6-B7DB-44FAF5360CE5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:vth-542xh_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.500.0000002.0.r.210715\", \"matchCriteriaId\": \"6F1138DD-7149-4191-BF6B-5176B8EF3A07\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:vth-542xh:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"72039FDA-344D-4961-BB1B-E6F32EAFD7C2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:vto-65xxx_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.300.0000004.0.r.210715\", \"matchCriteriaId\": \"4AC98964-DBDE-438C-A0E7-BF11D1BBC4B0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:vto-65xxx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9438ADC0-C8F4-48E1-A905-9914A3AE715E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:vto-75x95x_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.300.0000003.0.r.210714\", \"matchCriteriaId\": \"A3FFF94A-7F57-49D2-A6BA-5B58064C41C5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:vto-75x95x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B205125D-5A33-49B0-A2BA-BD833D107924\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:xvr-4x04_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5BFB4B89-FD66-4A9E-9163-8E27730012C8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:xvr-4x04:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97031A47-9275-45CD-AFBB-A906A3A37D71\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:xvr-4x08_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.001.0000001.1.r.210709\", \"matchCriteriaId\": \"83753916-EBB9-4378-9448-79B33EA851C7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:xvr-4x08:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6962025-38D1-4B8E-9C51-2806599F8779\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:xvr-4x04_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.001.0000001.1.r.210709\", \"matchCriteriaId\": \"C3D44B80-93EF-41AD-9BFD-B363CC8356CF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:xvr-4x04:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97031A47-9275-45CD-AFBB-A906A3A37D71\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:xvr-5x04_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.001.0000003.1.r.210710\", \"matchCriteriaId\": \"44FAD9FC-F99A-45DE-A8FA-031CD0F4680E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:xvr-5x04:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F496B4C1-062B-4C6E-9F8C-C3B49D4D98EF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:xvr-5x08_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.001.0000003.1.r.210710\", \"matchCriteriaId\": \"AEAA6256-9F3D-43C7-858C-D07025EE5400\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:xvr-5x08:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA245352-2E71-4401-AB16-1CA8D827D858\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:xvr-5x16_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.001.0000003.1.r.210710\", \"matchCriteriaId\": \"4C5D8D60-F5A5-42B2-830B-E4D89828988F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:xvr-5x16:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"60F64F53-4C08-48A1-A3EB-F3EB5A1C0631\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:xvr-7x16_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.001.0000003.1.r.210710\", \"matchCriteriaId\": \"22635FB9-7898-457B-938B-9946CFC9EE73\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:xvr-7x16:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"95CC3087-2310-4520-8B69-4F21F6F78197\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dahuasecurity:xvr-7x32_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.001.0000003.1.r.210710\", \"matchCriteriaId\": \"5D80CC1B-87EC-44BF-A453-A57350A4C061\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dahuasecurity:xvr-7x32:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"06268CD6-0DFD-4501-9D4E-AA25E14B215E\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad de omisi\\u00f3n de autenticaci\\u00f3n de identidad encontrada en algunos productos Dahua durante el proceso de inicio de sesi\\u00f3n. Los atacantes pueden omitir la autenticaci\\u00f3n de identidad del dispositivo al construir paquetes de datos maliciosos\"}]",
      "id": "CVE-2021-33045",
      "lastModified": "2024-11-21T06:08:11.097",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 10.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2021-09-15T22:15:10.687",
      "references": "[{\"url\": \"http://packetstormsecurity.com/files/164423/Dahua-Authentication-Bypass.html\", \"source\": \"cybersecurity@dahuatech.com\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2021/Oct/13\", \"source\": \"cybersecurity@dahuatech.com\", \"tags\": [\"Exploit\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://www.dahuasecurity.com/support/cybersecurity/details/957\", \"source\": \"cybersecurity@dahuatech.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://packetstormsecurity.com/files/164423/Dahua-Authentication-Bypass.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2021/Oct/13\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://www.dahuasecurity.com/support/cybersecurity/details/957\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "cybersecurity@dahuatech.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-287\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-33045\",\"sourceIdentifier\":\"cybersecurity@dahuatech.com\",\"published\":\"2021-09-15T22:15:10.687\",\"lastModified\":\"2026-01-13T22:20:20.110\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n de identidad encontrada en algunos productos Dahua durante el proceso de inicio de sesi\u00f3n. Los atacantes pueden omitir la autenticaci\u00f3n de identidad del dispositivo al construir paquetes de datos maliciosos\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"cisaExploitAdd\":\"2024-08-21\",\"cisaActionDue\":\"2024-09-11\",\"cisaRequiredAction\":\"Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\",\"cisaVulnerabilityName\":\"Dahua IP Camera Authentication Bypass Vulnerability\",\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:ipc-hum7xxx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.820.0000000.5.r.210705\",\"matchCriteriaId\":\"C0356805-3ECF-4C6F-B2BF-95D507736C44\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:ipc-hum7xxx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AE9ACB0-4CB3-4CF5-A007-15EE977D782E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:ipc-hx3xxx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.800.0000000.29.r.210630\",\"matchCriteriaId\":\"E0D17050-41CA-4808-8ED3-F332FD00B551\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:ipc-hx3xxx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8936A118-4AB5-4B09-A9FD-E624A68315BD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:ipc-hx5xxx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.820.0000000.5.r.210705\",\"matchCriteriaId\":\"3F20DC69-B735-4547-826D-E4C42A39FE82\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:ipc-hx5xxx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2838BDA-97FF-498E-BC81-955D31B9227A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:nvr-1xxx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.001.0000005.1.r.210709\",\"matchCriteriaId\":\"FA1C3935-C83B-4A1A-BEEE-EF93F7722972\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:nvr-1xxx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7780D1BE-ABE0-4890-B493-36FA0A4B3266\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:nvr-2xxx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.001.0000000.1.r.210710\",\"matchCriteriaId\":\"795EF8B2-5E6D-46EB-9F66-85F2C71B2619\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:nvr-2xxx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89E3F7B3-3C51-49C1-BAEC-DA4235D5A06D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:nvr-4xxx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.001.0000005.1.r.210713\",\"matchCriteriaId\":\"1386662B-C3DE-467A-8F41-F18BDE7B9726\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:nvr-4xxx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58ECDC49-09D4-4E62-AC11-E3C52C656A9D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:nvr-5xxx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.001.0000000.0.r.210710\",\"matchCriteriaId\":\"06A6B28A-2E0D-4E45-904A-66FEE5D85262\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:nvr-5xxx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE621958-8AE2-44E0-9E41-94BC964CDF57\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:nvr-6xx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.001.0000001.1.r.210716\",\"matchCriteriaId\":\"90D5A1B3-88D5-4E5E-A88B-59409D41956C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:nvr-6xx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EEAC798-870E-4DE6-B7DB-44FAF5360CE5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:vth-542xh_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.500.0000002.0.r.210715\",\"matchCriteriaId\":\"6F1138DD-7149-4191-BF6B-5176B8EF3A07\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:vth-542xh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72039FDA-344D-4961-BB1B-E6F32EAFD7C2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:vto-65xxx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.300.0000004.0.r.210715\",\"matchCriteriaId\":\"4AC98964-DBDE-438C-A0E7-BF11D1BBC4B0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:vto-65xxx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9438ADC0-C8F4-48E1-A905-9914A3AE715E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:vto-75x95x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.300.0000003.0.r.210714\",\"matchCriteriaId\":\"A3FFF94A-7F57-49D2-A6BA-5B58064C41C5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:vto-75x95x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B205125D-5A33-49B0-A2BA-BD833D107924\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:xvr-4x04_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BFB4B89-FD66-4A9E-9163-8E27730012C8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:xvr-4x04:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97031A47-9275-45CD-AFBB-A906A3A37D71\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:xvr-4x08_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.001.0000001.1.r.210709\",\"matchCriteriaId\":\"83753916-EBB9-4378-9448-79B33EA851C7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:xvr-4x08:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6962025-38D1-4B8E-9C51-2806599F8779\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:xvr-4x04_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.001.0000001.1.r.210709\",\"matchCriteriaId\":\"C3D44B80-93EF-41AD-9BFD-B363CC8356CF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:xvr-4x04:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97031A47-9275-45CD-AFBB-A906A3A37D71\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:xvr-5x04_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.001.0000003.1.r.210710\",\"matchCriteriaId\":\"44FAD9FC-F99A-45DE-A8FA-031CD0F4680E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:xvr-5x04:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F496B4C1-062B-4C6E-9F8C-C3B49D4D98EF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:xvr-5x08_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.001.0000003.1.r.210710\",\"matchCriteriaId\":\"AEAA6256-9F3D-43C7-858C-D07025EE5400\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:xvr-5x08:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA245352-2E71-4401-AB16-1CA8D827D858\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:xvr-5x16_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.001.0000003.1.r.210710\",\"matchCriteriaId\":\"4C5D8D60-F5A5-42B2-830B-E4D89828988F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:xvr-5x16:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60F64F53-4C08-48A1-A3EB-F3EB5A1C0631\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:xvr-7x16_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.001.0000003.1.r.210710\",\"matchCriteriaId\":\"22635FB9-7898-457B-938B-9946CFC9EE73\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:xvr-7x16:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95CC3087-2310-4520-8B69-4F21F6F78197\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dahuasecurity:xvr-7x32_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.001.0000003.1.r.210710\",\"matchCriteriaId\":\"5D80CC1B-87EC-44BF-A453-A57350A4C061\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dahuasecurity:xvr-7x32:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06268CD6-0DFD-4501-9D4E-AA25E14B215E\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/164423/Dahua-Authentication-Bypass.html\",\"source\":\"cybersecurity@dahuatech.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://seclists.org/fulldisclosure/2021/Oct/13\",\"source\":\"cybersecurity@dahuatech.com\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.dahuasecurity.com/support/cybersecurity/details/957\",\"source\":\"cybersecurity@dahuatech.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/164423/Dahua-Authentication-Bypass.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://seclists.org/fulldisclosure/2021/Oct/13\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.dahuasecurity.com/support/cybersecurity/details/957\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-33045\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"US Government Resource\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.dahuasecurity.com/support/cybersecurity/details/957\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2021/Oct/13\", \"name\": \"20211005 [Update]: Dahua Authentication bypass (CVE-2021-33044, CVE-2021-33045)\", \"tags\": [\"mailing-list\", \"x_refsource_FULLDISC\", \"x_transferred\"]}, {\"url\": \"http://packetstormsecurity.com/files/164423/Dahua-Authentication-Bypass.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T23:42:19.573Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2024-08-21\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-33045\"}}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-33045\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-05T15:03:50.889187Z\"}}}], \"references\": [{\"url\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-33045\", \"tags\": [\"government-resource\"]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-287\", \"description\": \"CWE-287 Improper Authentication\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-05T15:03:55.689Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"Some Dahua IP Camera, Video Intercom, NVR, XVR devices\", \"versions\": [{\"status\": \"affected\", \"version\": \"Dahua IP Camera devices IPC-HX3XXX, IPC-HX5XXX, and IPC-HUM7XXX Buildtime before May, 2020, Video Intercom devices VTO75X95X, VTO65XXX, and VTH542XH, NVR devices NVR1XXX, NVR2XXX, NVR5XXX, and NVR6XX, XVR devices XVR4xxx, XVR5xxx, and XVR7xxx Buildtime before December, 2019.\"}]}], \"references\": [{\"url\": \"https://www.dahuasecurity.com/support/cybersecurity/details/957\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2021/Oct/13\", \"name\": \"20211005 [Update]: Dahua Authentication bypass (CVE-2021-33044, CVE-2021-33045)\", \"tags\": [\"mailing-list\", \"x_refsource_FULLDISC\"]}, {\"url\": \"http://packetstormsecurity.com/files/164423/Dahua-Authentication-Bypass.html\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"Improper Authentication\"}]}], \"providerMetadata\": {\"orgId\": \"79ee569e-7d1e-4364-98f0-3a18e2a739ad\", \"shortName\": \"dahua\", \"dateUpdated\": \"2021-10-06T16:06:10.000Z\"}, \"x_legacyV4Record\": {\"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"Dahua IP Camera devices IPC-HX3XXX, IPC-HX5XXX, and IPC-HUM7XXX Buildtime before May, 2020, Video Intercom devices VTO75X95X, VTO65XXX, and VTH542XH, NVR devices NVR1XXX, NVR2XXX, NVR5XXX, and NVR6XX, XVR devices XVR4xxx, XVR5xxx, and XVR7xxx Buildtime before December, 2019.\"}]}, \"product_name\": \"Some Dahua IP Camera, Video Intercom, NVR, XVR devices\"}]}, \"vendor_name\": \"n/a\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://www.dahuasecurity.com/support/cybersecurity/details/957\", \"name\": \"https://www.dahuasecurity.com/support/cybersecurity/details/957\", \"refsource\": \"MISC\"}, {\"url\": \"http://seclists.org/fulldisclosure/2021/Oct/13\", \"name\": \"20211005 [Update]: Dahua Authentication bypass (CVE-2021-33044, CVE-2021-33045)\", \"refsource\": \"FULLDISC\"}, {\"url\": \"http://packetstormsecurity.com/files/164423/Dahua-Authentication-Bypass.html\", \"name\": \"http://packetstormsecurity.com/files/164423/Dahua-Authentication-Bypass.html\", \"refsource\": \"MISC\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"Improper Authentication\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2021-33045\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"cybersecurity@dahuatech.com\"}}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2021-33045\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-01-12T19:53:51.321Z\", \"dateReserved\": \"2021-05-17T00:00:00.000Z\", \"assignerOrgId\": \"79ee569e-7d1e-4364-98f0-3a18e2a739ad\", \"datePublished\": \"2021-09-15T21:50:08.000Z\", \"assignerShortName\": \"dahua\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.2"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…