** DISPUTED ** HikVision Wi-Fi IP cameras, when used in a wired configuration, allow physically proximate attackers to trigger association with an arbitrary access point by leveraging a default SSID with no WiFi encryption or authentication. NOTE: Vendor states that this is not a vulnerability, but more an increase to the attack surface of the product.
                
            References
                    | Link | Resource | 
|---|---|
| http://packetstormsecurity.com/files/145131/HikVision-Wi-Fi-IP-Camera-Wireless-Access-Point-State.html | Third Party Advisory VDB Entry | 
| http://seclists.org/fulldisclosure/2017/Nov/43 | Mailing List Third Party Advisory | 
| http://packetstormsecurity.com/files/145131/HikVision-Wi-Fi-IP-Camera-Wireless-Access-Point-State.html | Third Party Advisory VDB Entry | 
| http://seclists.org/fulldisclosure/2017/Nov/43 | Mailing List Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    21 Nov 2024, 03:13
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://packetstormsecurity.com/files/145131/HikVision-Wi-Fi-IP-Camera-Wireless-Access-Point-State.html - Third Party Advisory, VDB Entry | |
| References | () http://seclists.org/fulldisclosure/2017/Nov/43 - Mailing List, Third Party Advisory | 
Information
                Published : 2017-12-01 17:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-14953
Mitre link : CVE-2017-14953
CVE.ORG link : CVE-2017-14953
JSON object : View
Products Affected
                hikvision
- ds-2cd2432f-iw_firmware
- ds-2cd2432f-iw
CWE
                
                    
                        
                        CWE-311
                        
            Missing Encryption of Sensitive Data
