Lucene search

K
cve[email protected]CVE-2019-9676
HistoryJun 12, 2019 - 3:29 p.m.

CVE-2019-9676

2019-06-1215:29:00
CWE-119
web.nvd.nist.gov
37
dahua
ipcam
vulnerability
buffer overflow
cve-2019-9676
security fix
nvd

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.7%

Buffer overflow vulnerability found in some Dahua IP Camera devices IPC-HFW1XXX,IPC-HDW1XXX,IPC-HFW2XXX Build before 2018/11. The vulnerability exits in the function of redirection display for serial port printing information, which can not be used by product basic functions. After an attacker logs in locally, this vulnerability can be exploited to cause device restart or arbitrary code execution. Dahua has identified the corresponding security problems in the static code auditing process, so it has gradually deleted this function, which is no longer available in the newer devices and softwares. Dahua has released versions of the affected products to fix the vulnerability.

Affected configurations

NVD
Node
dahuasecurityipc-hfw1xxx_firmwareRange<2018-11
AND
dahuasecurityipc-hfw1xxxMatch-
Node
dahuasecurityipc-hdw1xxx_firmwareRange<2018-11
AND
dahuasecurityipc-hdw1xxxMatch-
Node
dahuasecurityipc-hfw2xxx_firmwareRange<2018-11
AND
dahuasecurityipc-hfw2xxxMatch-

CNA Affected

[
  {
    "product": "IPC-HFW1XXX,IPC-HDW1XXX,IPC-HFW2XXX",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "Build before 2018/11"
      }
    ]
  }
]

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.7%

Related for CVE-2019-9676