"value":"A possible buffer overflow in selected cameras' drivers from XProtect Device Pack can allow an attacker with access to internal network to execute commands on Recording Server under strict conditions."
}
]
},
"problemtype":{
"problemtype_data":[
{
"description":[
{
"lang":"eng",
"value":"CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')",
"value":"If, for any reason, patching is not possible, you should proceed with caution when adding new cameras and \nscan only IPs which are confirmed to be valid and trusted devices.\n\n<br>"
}
],
"value":"If, for any reason, patching is not possible, you should proceed with caution when adding new cameras and \nscan only IPs which are confirmed to be valid and trusted devices."
}
],
"exploit":[
{
"lang":"en",
"supportingMedia":[
{
"base64":false,
"type":"text/html",
"value":"No public PoC or exploit \nis known.\n\n<br>"
}
],
"value":"No public PoC or exploit \nis known."
}
],
"solution":[
{
"lang":"en",
"supportingMedia":[
{
"base64":false,
"type":"text/html",
"value":"<span style=\"background-color: rgb(255, 255, 255);\">To mitigate the issue, we highly recommend installing the XProtect Device Pack version 13.2a or later which contains the most up to date device drivers.</span><br>"
}
],
"value":"To mitigate the issue, we highly recommend installing the XProtect Device Pack version 13.2a or later which contains the most up to date device drivers."