Lucene search

K
cveBitdefenderCVE-2022-2471
HistorySep 15, 2022 - 2:15 p.m.

CVE-2022-2471

2022-09-1514:15:09
CWE-121
Bitdefender
web.nvd.nist.gov
27
6
cve-2022-2471
stack-based buffer overflow
ezviz
motion detection
remote code execution
vulnerability
security advisory

CVSS3

9.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.004

Percentile

74.9%

Stack-based Buffer Overflow vulnerability in the EZVIZ Motion Detection component as used in camera models CS-CV248, CS-C6N-A0-1C2WFR, CS-DB1C-A0-1E2W2FR, CS-C6N-B0-1G2WF, CS-C3W-A0-3H4WFRL allows a remote attacker to execute remote code on the device. This issue affects: EZVIZ CS-CV248 versions prior to 5.2.3 build 220725. EZVIZ CS-C6N-A0-1C2WFR versions prior to 5.3.0 build 220428. EZVIZ CS-DB1C-A0-1E2W2FR versions prior to 5.3.0 build 220802. EZVIZ CS-C6N-B0-1G2WF versions prior to 5.3.0 build 220712. EZVIZ CS-C3W-A0-3H4WFRL versions prior to 5.3.5 build 220723.

Affected configurations

Nvd
Node
ezvizcs-c6n-a0-1c2wfr_firmwareMatch5.3.0build201719
AND
ezvizcs-c6n-a0-1c2wfrMatch-
Node
ezvizcs-db1c-a0-1e2w2fr_firmwareMatch5.3.0build211208
AND
ezvizcs-db1c-a0-1e2w2frMatch-
Node
ezvizcs-c6n-b0-1g2wf_firmwareMatch5.3.0build210731
AND
ezvizcs-c6n-b0-1g2wfMatch-
Node
ezvizcs-c3w-a0-3h4wfrl_firmwareMatch5.3.5build220120
AND
ezvizcs-c3w-a0-3h4wfrlMatch-
Node
ezvizcs-cv248_firmwareMatch5.2.1build180403
AND
ezvizcs-cv248Match-
VendorProductVersionCPE
ezvizcs-c6n-a0-1c2wfr_firmware5.3.0cpe:2.3:o:ezviz:cs-c6n-a0-1c2wfr_firmware:5.3.0:build201719:*:*:*:*:*:*
ezvizcs-c6n-a0-1c2wfr-cpe:2.3:h:ezviz:cs-c6n-a0-1c2wfr:-:*:*:*:*:*:*:*
ezvizcs-db1c-a0-1e2w2fr_firmware5.3.0cpe:2.3:o:ezviz:cs-db1c-a0-1e2w2fr_firmware:5.3.0:build211208:*:*:*:*:*:*
ezvizcs-db1c-a0-1e2w2fr-cpe:2.3:h:ezviz:cs-db1c-a0-1e2w2fr:-:*:*:*:*:*:*:*
ezvizcs-c6n-b0-1g2wf_firmware5.3.0cpe:2.3:o:ezviz:cs-c6n-b0-1g2wf_firmware:5.3.0:build210731:*:*:*:*:*:*
ezvizcs-c6n-b0-1g2wf-cpe:2.3:h:ezviz:cs-c6n-b0-1g2wf:-:*:*:*:*:*:*:*
ezvizcs-c3w-a0-3h4wfrl_firmware5.3.5cpe:2.3:o:ezviz:cs-c3w-a0-3h4wfrl_firmware:5.3.5:build220120:*:*:*:*:*:*
ezvizcs-c3w-a0-3h4wfrl-cpe:2.3:h:ezviz:cs-c3w-a0-3h4wfrl:-:*:*:*:*:*:*:*
ezvizcs-cv248_firmware5.2.1cpe:2.3:o:ezviz:cs-cv248_firmware:5.2.1:build180403:*:*:*:*:*:*
ezvizcs-cv248-cpe:2.3:h:ezviz:cs-cv248:-:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "CS-CV248",
    "vendor": "EZVIZ",
    "versions": [
      {
        "lessThan": "5.2.3 build 220725",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "CS-C6N-A0-1C2WFR",
    "vendor": "EZVIZ",
    "versions": [
      {
        "lessThan": "5.3.0 build 220428",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "CS-DB1C-A0-1E2W2FR",
    "vendor": "EZVIZ",
    "versions": [
      {
        "lessThan": "5.3.0 build 220802",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "CS-C6N-B0-1G2WF",
    "vendor": "EZVIZ",
    "versions": [
      {
        "lessThan": "5.3.0 build 220712",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "CS-C3W-A0-3H4WFRL",
    "vendor": "EZVIZ",
    "versions": [
      {
        "lessThan": "5.3.5 build 220723",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

CVSS3

9.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.004

Percentile

74.9%

Related for CVE-2022-2471