9.8
CVE-2017-7925
- EPSS 80.41%
- Veröffentlicht 06.05.2017 00:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
- Quelle ics-cert@hq.dhs.gov
- CVE-Watchlists
- Unerledigt
A Password in Configuration File issue was discovered in Dahua DH-IPC-HDBW23A0RN-ZS, DH-IPC-HDBW13A0SN, DH-IPC-HDW1XXX, DH-IPC-HDW2XXX, DH-IPC-HDW4XXX, DH-IPC-HFW1XXX, DH-IPC-HFW2XXX, DH-IPC-HFW4XXX, DH-SD6CXX, DH-NVR1XXX, DH-HCVR4XXX, DH-HCVR5XXX, DHI-HCVR51A04HE-S3, DHI-HCVR51A08HE-S3, and DHI-HCVR58A32S-S2 devices. The password in configuration file vulnerability was identified, which could lead to a malicious user assuming the identity of a privileged user and gaining access to sensitive information.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Dahuasecurity ≫ Dh-ipc-hdbw23a0rn-zs Firmware Version-
Dahuasecurity ≫ Dh-ipc-hdbw13a0sn Firmware Version-
Dahuasecurity ≫ Dh-ipc-hdw1xxx Firmware Version-
Dahuasecurity ≫ Dh-ipc-hdw2xxx Firmware Version-
Dahuasecurity ≫ Dh-ipc-hdw4xxx Firmware Version-
Dahuasecurity ≫ Dh-ipc-hfw1xxx Firmware Version-
Dahuasecurity ≫ Dh-ipc-hfw2xxx Firmware Version-
Dahuasecurity ≫ Dh-ipc-hfw4xxx Firmware Version-
Dahuasecurity ≫ Dh-sd6cxx Firmware Version-
Dahuasecurity ≫ Dh-nvr1xxx Firmware Version-
Dahuasecurity ≫ Dh-hcvr4xxx Firmware Version-
Dahuasecurity ≫ Dh-hcvr5xxx Firmware Version-
Dahuasecurity ≫ Dhi-hcvr51a04he-s3 Firmware Version-
Dahuasecurity ≫ Dhi-hcvr51a08he-s3 Firmware Version-
Dahuasecurity ≫ Dhi-hcvr58a32s-s2 Firmware Version-
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 80.41% | 0.991 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:P/I:N/A:N
|
CWE-260 Password in Configuration File
The product stores a password in a configuration file that might be accessible to actors who do not know the password.
CWE-522 Insufficiently Protected Credentials
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.