7.2
CVE-2020-9499
- EPSS 0.53%
- Veröffentlicht 09.04.2020 14:15:13
- Zuletzt bearbeitet 21.11.2024 05:40:46
- Quelle cybersecurity@dahuatech.com
- CVE-Watchlists
- Unerledigt
Some Dahua products have buffer overflow vulnerabilities. After the successful login of the legal account, the attacker sends a specific DDNS test command, which may cause the device to go down.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Dahuasecurity ≫ Sd6al Firmware Version < 2019-12
Dahuasecurity ≫ Sd5a Firmware Version < 2019-12
Dahuasecurity ≫ Sd1a Firmware Version < 2019-12
Dahuasecurity ≫ Ptz1a Firmware Version < 2019-12
Dahuasecurity ≫ Sd50 Firmware Version < 2019-12
Dahuasecurity ≫ Sd52c Firmware Version < 2019-12
Dahuasecurity ≫ Ipc-hx5842h Firmware Version < 2019-12
Dahuasecurity ≫ Ipc-hx7842h Firmware Version < 2019-12
Dahuasecurity ≫ Ipc-hx2xxx Firmware Version < 2019-12
Dahuasecurity ≫ Ipc-hxxx5x4x Firmware Version < 2019-12
Dahuasecurity ≫ N42b1p Firmware Version < 2019-12
Dahuasecurity ≫ N42b2p Firmware Version < 2019-12
Dahuasecurity ≫ N42b3p Firmware Version < 2019-12
Dahuasecurity ≫ N52a4p Firmware Version < 2019-12
Dahuasecurity ≫ N54a4p Firmware Version < 2019-12
Dahuasecurity ≫ N52b2p Firmware Version < 2019-12
Dahuasecurity ≫ N52b5p Firmware Version < 2019-12
Dahuasecurity ≫ N52b3p Firmware Version < 2019-12
Dahuasecurity ≫ N54b2p Firmware Version < 2019-12
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.53% | 0.665 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.2 | 1.2 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 6.5 | 8 | 6.4 |
AV:N/AC:L/Au:S/C:P/I:P/A:P
|
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.