René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

145 lines
4.9 KiB
JSON

{
"id": "CVE-2020-11624",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-07-23T21:15:11.753",
"lastModified": "2020-07-29T15:49:41.757",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in AvertX Auto focus Night Vision HD Indoor/Outdoor IP Dome Camera HD838 and Night Vision HD Indoor/Outdoor Mini IP Bullet Camera HD438. They do not require users to change the default password for the admin account. They only show a pop-up window suggesting a change but there's no enforcement. An administrator can click Cancel and proceed to use the device without changing the password. Additionally, they disclose the default username within the login.js script. Since many attacks for IoT devices, including malware and exploits, are based on the usage of default credentials, it makes these cameras an easy target for malicious actors."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema en AvertX Auto focus Night Vision HD Indoor/Outdoor IP Dome Camera HD838 y Night Vision HD Indoor/Outdoor Mini IP Bullet Camera HD438. No requieren que los usuarios cambien la contrase\u00f1a predeterminada para la cuenta de administrador. Solo muestran una ventana emergente que sugiere un cambio, pero no hay cumplimiento. Un administrador puede hacer clic en Cancelar y continuar usando el dispositivo sin cambiar la contrase\u00f1a. Adem\u00e1s, divulgan el nombre de usuario predeterminado dentro del script login.js. Dado que muchos ataques para dispositivos IoT, incluidos malware y exploits, son basadas en el uso de credenciales predeterminadas, hace que estas c\u00e1maras sean un objetivo f\u00e1cil para actores maliciosos"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-521"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:avertx:hd838_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B511526-D9AF-41D3-8C58-ED591FB6D28A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:avertx:hd838:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02958C46-401D-478F-A217-BCA0B0E4899F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:avertx:hd438_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79C42137-9911-47AC-B051-5FAC413711AD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:avertx:hd438:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF06CB88-3801-4319-93D3-285C4CBC6F8F"
}
]
}
]
}
],
"references": [
{
"url": "https://unit42.paloaltonetworks.com/avertx-ip-cameras-vulnerabilities/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
]
}
]
}