3.7
CVE-2022-45430
- EPSS 0.1%
- Veröffentlicht 27.12.2022 18:15:10
- Zuletzt bearbeitet 11.04.2025 23:15:27
- Quelle cybersecurity@dahuatech.com
- CVE-Watchlists
- Unerledigt
Some Dahua software products have a vulnerability of unauthenticated enable or disable SSHD service. After bypassing the firewall access control policy, by sending a specific crafted packet to the vulnerable interface, an attacker could enable or disable the SSHD service.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Dahuasecurity ≫ Dss Express Version7.002.1760000.2
Dahuasecurity ≫ Dss Express Version8.0.2
Dahuasecurity ≫ Dss Express Version8.0.4
Dahuasecurity ≫ Dss Express Version8.1
Dahuasecurity ≫ Dss Express Version8.1.1
Dahuasecurity ≫ Dss Professional Version7.002.1760000.2
Dahuasecurity ≫ Dss Professional Version8.0.2
Dahuasecurity ≫ Dss Professional Version8.0.4
Dahuasecurity ≫ Dss Professional Version8.1
Dahuasecurity ≫ Dss Professional Version8.1.1
Dahuasecurity ≫ Dhi-dss7016d-s2 Firmware Version1.001.0000001.2
Dahuasecurity ≫ Dhi-dss7016d-s2 Firmware Version8.0.2
Dahuasecurity ≫ Dhi-dss7016d-s2 Firmware Version8.0.4
Dahuasecurity ≫ Dhi-dss7016d-s2 Firmware Version8.1
Dahuasecurity ≫ Dhi-dss7016dr-s2 Firmware Version1.001.0000001.2
Dahuasecurity ≫ Dhi-dss7016dr-s2 Firmware Version8.0.2
Dahuasecurity ≫ Dhi-dss7016dr-s2 Firmware Version8.0.4
Dahuasecurity ≫ Dhi-dss7016dr-s2 Firmware Version8.1
Dahuasecurity ≫ Dhi-dss4004-s2 Firmware Version1.001.0000001.2
Dahuasecurity ≫ Dhi-dss4004-s2 Firmware Version8.0.2
Dahuasecurity ≫ Dhi-dss4004-s2 Firmware Version8.0.4
Dahuasecurity ≫ Dhi-dss4004-s2 Firmware Version8.1
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.1% | 0.284 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 3.7 | 2.2 | 1.4 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 3.7 | 2.2 | 1.4 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
|
CWE-284 Improper Access Control
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.