CVE-2019-3948

The Amcrest IP2M-841B V2.520.AC00.18.R, Dahua IPC-XXBXX V2.622.0000000.9.R, Dahua IPC HX5X3X and HX4X3X V2.800.0000008.0.R, Dahua DH-IPC HX883X and DH-IPC-HX863X V2.622.0000000.7.R, Dahua DH-SD4XXXXX V2.623.0000000.7.R, Dahua DH-SD5XXXXX V2.623.0000000.1.R, Dahua DH-SD6XXXXX V2.640.0000000.2.R and V2.623.0000000.1.R, Dahua NVR5XX-4KS2 V3.216.0000006.0.R, Dahua NVR4XXX-4KS2 V3.216.0000006.0.R, and NVR2XXX-4KS2 do not require authentication to access the HTTP endpoint /videotalk. An unauthenticated, remote person can connect to this endpoint and potentionally listen to the audio of the capturing device.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:amcrest:ip2m-841b_firmware:2.520.ac00.18.r:*:*:*:*:*:*:*
cpe:2.3:h:amcrest:ip2m-841b:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:dahua:dh-ipc-hx863x:*:*:*:*:*:*:*:*
cpe:2.3:o:dahua:dh-ipc-hx883x:*:*:*:*:*:*:*:*
cpe:2.3:o:dahua:dh-sd4xxxxx:*:*:*:*:*:*:*:*
cpe:2.3:o:dahua:dh-sd5xxxxx:*:*:*:*:*:*:*:*
cpe:2.3:o:dahua:dh-sd6xxxxx:*:*:*:*:*:*:*:*
cpe:2.3:o:dahua:ipc-hx4x3x:*:*:*:*:*:*:*:*
cpe:2.3:o:dahua:ipc-hx5x3x:*:*:*:*:*:*:*:*
cpe:2.3:o:dahua:ipc-xxbxx:*:*:*:*:*:*:*:*
cpe:2.3:o:dahua:nvr2xxx-4ks2:*:*:*:*:*:*:*:*
cpe:2.3:o:dahua:nvr4xxx-4ks2:*:*:*:*:*:*:*:*
cpe:2.3:o:dahua:nvr5xxx-4ks2:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:42

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/153813/Amcrest-Cameras-2.520.AC00.18.R-Unauthenticated-Audio-Streaming.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/153813/Amcrest-Cameras-2.520.AC00.18.R-Unauthenticated-Audio-Streaming.html - Exploit, Third Party Advisory, VDB Entry
References () https://us.dahuasecurity.com/wp-content/uploads/2019/08/Cybersecurity_2019-08-02.pdf - () https://us.dahuasecurity.com/wp-content/uploads/2019/08/Cybersecurity_2019-08-02.pdf -
References () https://www.dahuasecurity.com/support/cybersecurity/details/627?us - () https://www.dahuasecurity.com/support/cybersecurity/details/627?us -
References () https://www.tenable.com/security/research/tra-2019-36 - Exploit, Third Party Advisory () https://www.tenable.com/security/research/tra-2019-36 - Exploit, Third Party Advisory

Information

Published : 2019-07-29 22:15

Updated : 2024-11-21 04:42


NVD link : CVE-2019-3948

Mitre link : CVE-2019-3948

CVE.ORG link : CVE-2019-3948


JSON object : View

Products Affected

dahua

  • dh-ipc-hx883x
  • dh-sd4xxxxx
  • dh-ipc-hx863x
  • ipc-hx4x3x
  • nvr4xxx-4ks2
  • ipc-hx5x3x
  • nvr2xxx-4ks2
  • nvr5xxx-4ks2
  • dh-sd5xxxxx
  • dh-sd6xxxxx
  • ipc-xxbxx

amcrest

  • ip2m-841b_firmware
  • ip2m-841b
CWE
CWE-306

Missing Authentication for Critical Function