9.8
CVE-2020-9502
- EPSS 0.6%
- Veröffentlicht 13.05.2020 16:15:13
- Zuletzt bearbeitet 21.11.2024 05:40:47
- Quelle cybersecurity@dahuatech.com
- CVE-Watchlists
- Unerledigt
Some Dahua products with Build time before December 2019 have Session ID predictable vulnerabilities. During normal user access, an attacker can use the predicted Session ID to construct a data packet to attack the device.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Dahuasecurity ≫ Sd6al Firmware Version < 2019-12
Dahuasecurity ≫ Sd5a Firmware Version < 2019-12
Dahuasecurity ≫ Sd1a Firmware Version < 2019-12
Dahuasecurity ≫ Ptz1a Firmware Version < 2019-12
Dahuasecurity ≫ Sd50 Firmware Version < 2019-12
Dahuasecurity ≫ Sd52c Firmware Version < 2019-12
Dahuasecurity ≫ Ipc-hx5842h Firmware Version < 2019-12
Dahuasecurity ≫ Ipc-hx7842h Firmware Version < 2019-12
Dahuasecurity ≫ Ipc-hx2xxx Firmware Version < 2019-12
Dahuasecurity ≫ Ipc-hxxx5x4x Firmware Version < 2019-12
Dahuasecurity ≫ N42b1p Firmware Version < 2019-12
Dahuasecurity ≫ N42b2p Firmware Version < 2019-12
Dahuasecurity ≫ N42b3p Firmware Version < 2019-12
Dahuasecurity ≫ N52a4p Firmware Version < 2019-12
Dahuasecurity ≫ N54a4p Firmware Version < 2019-12
Dahuasecurity ≫ N52b2p Firmware Version < 2019-12
Dahuasecurity ≫ N52b5p Firmware Version < 2019-12
Dahuasecurity ≫ N52b3p Firmware Version < 2019-12
Dahuasecurity ≫ N54b2p Firmware Version < 2019-12
Dahuasecurity ≫ Ipc-hdbw1320e-w Firmware Version < 2019-12
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.6% | 0.687 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
CWE-330 Use of Insufficiently Random Values
The product uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.