3.7
CVE-2022-45433
- EPSS 0.1%
- Veröffentlicht 27.12.2022 18:15:10
- Zuletzt bearbeitet 14.04.2025 14:15:21
- Quelle cybersecurity@dahuatech.com
- CVE-Watchlists
- Unerledigt
Some Dahua software products have a vulnerability of unauthenticated traceroute host from remote DSS Server. After bypassing the firewall access control policy, by sending a specific crafted packet to the vulnerable interface, an attacker could get the traceroute results.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Dahuasecurity ≫ Dhi-dss7016d-s2 Firmware Version1.001.0000001.2
Dahuasecurity ≫ Dhi-dss7016d-s2 Firmware Version8.0.2
Dahuasecurity ≫ Dhi-dss7016d-s2 Firmware Version8.0.4
Dahuasecurity ≫ Dhi-dss7016d-s2 Firmware Version8.1
Dahuasecurity ≫ Dhi-dss7016dr-s2 Firmware Version1.001.0000001.2
Dahuasecurity ≫ Dhi-dss7016dr-s2 Firmware Version8.0.2
Dahuasecurity ≫ Dhi-dss7016dr-s2 Firmware Version8.0.4
Dahuasecurity ≫ Dhi-dss7016dr-s2 Firmware Version8.1
Dahuasecurity ≫ Dhi-dss4004-s2 Firmware Version1.001.0000001.2
Dahuasecurity ≫ Dhi-dss4004-s2 Firmware Version8.0.2
Dahuasecurity ≫ Dhi-dss4004-s2 Firmware Version8.0.4
Dahuasecurity ≫ Dhi-dss4004-s2 Firmware Version8.1
Dahuasecurity ≫ Dss Express Version7.002.1760000.2
Dahuasecurity ≫ Dss Express Version8.0.2
Dahuasecurity ≫ Dss Express Version8.0.4
Dahuasecurity ≫ Dss Express Version8.1
Dahuasecurity ≫ Dss Express Version8.1.1
Dahuasecurity ≫ Dss Professional Version7.002.1760000.2
Dahuasecurity ≫ Dss Professional Version8.0.2
Dahuasecurity ≫ Dss Professional Version8.0.4
Dahuasecurity ≫ Dss Professional Version8.1
Dahuasecurity ≫ Dss Professional Version8.1.1
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.1% | 0.285 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 3.7 | 2.2 | 1.4 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 3.7 | 2.2 | 1.4 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
|
CWE-306 Missing Authentication for Critical Function
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.