Lucene search

K
cve[email protected]CVE-2017-9316
HistoryNov 27, 2017 - 5:29 p.m.

CVE-2017-9316

2017-11-2717:29:00
CWE-287
web.nvd.nist.gov
20
dahua
ipc-hdw4300s
firmware upgrade
authentication bypass
vulnerability
ip products
debug function

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:P/A:P

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H

7.1 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

67.9%

Firmware upgrade authentication bypass vulnerability was found in Dahua IPC-HDW4300S and some IP products. The vulnerability was caused by internal Debug function. This particular function was used for problem analysis and performance tuning during product development phase. It allowed the device to receive only specific data (one direction, no transmit) and therefore it was not involved in any instance of collecting user privacy data or allowing remote code execution.

Affected configurations

NVD
Node
dahuasecuritynvr11hs_firmwareMatch3.210.0000.0.r.20150206
OR
dahuasecuritynvr11hs_firmwareMatch3.210.0000.1.r.20150420
OR
dahuasecuritynvr11hs_firmwareMatch3.210.0000.2.r.20150715
OR
dahuasecuritynvr11hs_firmwareMatch3.210.0000.3.r.20150921
OR
dahuasecuritynvr11hs_firmwareMatch3.210.0000.5.r.20160409
OR
dahuasecuritynvr11hs_firmwareMatch3.210.0000.5.r.20160603
OR
dahuasecuritynvr11hs_firmwareMatch3.210.0000.5.r.20160803
OR
dahuasecuritynvr11hs_firmwareMatch3.210.0000.5.r.20161226
OR
dahuasecuritynvr11hs_firmwareMatch3.210.0000.5.r.20170305
OR
dahuasecuritynvr11hs_firmwareMatch3.210.0000.5.r.20170321
AND
dahuasecuritynvr11hsMatch-
Node
dahuasecurityipc-hdw4300s_firmwareMatch2.240.0009.0.r.20131015
OR
dahuasecurityipc-hdw4300s_firmwareMatch2.400.0000.0.r.20131231
OR
dahuasecurityipc-hdw4300s_firmwareMatch2.420.0000.0.r.20140419
OR
dahuasecurityipc-hdw4300s_firmwareMatch2.420.0002.0.r.20140621
OR
dahuasecurityipc-hdw4300s_firmwareMatch2.420.0002.0.r.20140724
OR
dahuasecurityipc-hdw4300s_firmwareMatch2.420.0005.0.r.20141205
OR
dahuasecurityipc-hdw4300s_firmwareMatch2.420.0006.0.r.20150311
OR
dahuasecurityipc-hdw4300s_firmwareMatch2.420.0007.0.r.20150409
OR
dahuasecurityipc-hdw4300s_firmwareMatch2.420.0008.0.r.20150710
AND
dahuasecurityipc-hdw4300sMatch-
Node
dahuasecurityipc-hfw4x00_firmwareMatch2.400.0000.3.r.20150312
OR
dahuasecurityipc-hfw4x00_firmwareMatch2.420.0006.0.r.20150311
AND
dahuasecurityipc-hfw4x00Match-
Node
dahuasecurityipc-hdw4x00_firmwareMatch2.400.0000.3.r.20150312
OR
dahuasecurityipc-hdw4x00_firmwareMatch2.420.0006.0.r.20150311
AND
dahuasecurityipc-hdw4x00Match-
Node
dahuasecurityipc-hdbw4x00_firmwareMatch2.400.0000.3.r.20150312
OR
dahuasecurityipc-hdbw4x00_firmwareMatch2.420.0006.0.r.20150311
AND
dahuasecurityipc-hdbw4x00Match-
Node
dahuasecurityipc-hf5x00_firmwareMatch2.400.0000.3.r.20150312
OR
dahuasecurityipc-hf5x00_firmwareMatch2.420.0006.0.r.20150311
AND
dahuasecurityipc-hf5x00Match-
Node
dahuasecurityipc-hfw5x00_firmwareMatch2.400.0000.3.r.20150312
OR
dahuasecurityipc-hfw5x00_firmwareMatch2.420.0006.0.r.20150311
AND
dahuasecurityipc-hfw5x00Match-
Node
dahuasecurityipc-hdw5x00_firmwareMatch2.400.0000.3.r.20150312
OR
dahuasecurityipc-hdw5x00_firmwareMatch2.420.0006.0.r.20150311
AND
dahuasecurityipc-hdw5x00Match-
Node
dahuasecurityipc-hdbw5x00_firmwareMatch2.400.0000.3.r.20150312
OR
dahuasecurityipc-hdbw5x00_firmwareMatch2.420.0006.0.r.20150311
AND
dahuasecurityipc-hdbw5x00Match-

CNA Affected

[
  {
    "product": "IPC-HDW4300S\\NVR11HS\\IPC-HFW4X00\\IPC-HDW4X00\\IPC-HDBW4X00\\IPC-HF5X00\\IPC-HFW5X00\\IPC-HDW5X00\\IPC-HDBW5X00\\NVR11HS",
    "vendor": "Dahua Technologies",
    "versions": [
      {
        "status": "affected",
        "version": "References are as :http://www.dahuasecurity.com/annoucementsingle/security-advisory--high-risk-vulnerability-found-in-dahua-ipc-hdw4300s-and-some-ip-products_14731_231.html"
      }
    ]
  }
]

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:P/A:P

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H

7.1 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

67.9%

Related for CVE-2017-9316