Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2021-33045

Summary
Assigner-dahua
Assigner Org ID-79ee569e-7d1e-4364-98f0-3a18e2a739ad
Published At-15 Sep, 2021 | 21:50
Updated At-30 Jul, 2025 | 01:37
Rejected At-
Credits

Dahua IP Camera Authentication Bypass Vulnerability

Dahua IP cameras and related products contain an authentication bypass vulnerability when the loopback device is specified by the client during authentication.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Known Exploited Vulnerabilities (KEV)
cisa.gov
Vendor:
Dahua Technology Co., LtdDahua
Product:IP Camera Firmware
Added At:21 Aug, 2024
Due At:11 Sep, 2024

Dahua IP Camera Authentication Bypass Vulnerability

Dahua IP cameras and related products contain an authentication bypass vulnerability when the loopback device is specified by the client during authentication.

Used in Ransomware

:

Unknown

CWE

:
CWE-287

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Additional Notes:

https://www.dahuasecurity.com/aboutUs/trustedCenter/details/582; https://nvd.nist.gov/vuln/detail/CVE-2021-33045
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:dahua
Assigner Org ID:79ee569e-7d1e-4364-98f0-3a18e2a739ad
Published At:15 Sep, 2021 | 21:50
Updated At:30 Jul, 2025 | 01:37
Rejected At:
▼CVE Numbering Authority (CNA)

The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.

Affected Products
Vendor
n/a
Product
Some Dahua IP Camera, Video Intercom, NVR, XVR devices
Versions
Affected
  • Dahua IP Camera devices IPC-HX3XXX, IPC-HX5XXX, and IPC-HUM7XXX Buildtime before May, 2020, Video Intercom devices VTO75X95X, VTO65XXX, and VTH542XH, NVR devices NVR1XXX, NVR2XXX, NVR5XXX, and NVR6XX, XVR devices XVR4xxx, XVR5xxx, and XVR7xxx Buildtime before December, 2019.
Problem Types
TypeCWE IDDescription
textN/AImproper Authentication
Type: text
CWE ID: N/A
Description: Improper Authentication
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.dahuasecurity.com/support/cybersecurity/details/957
x_refsource_MISC
http://seclists.org/fulldisclosure/2021/Oct/13
mailing-list
x_refsource_FULLDISC
http://packetstormsecurity.com/files/164423/Dahua-Authentication-Bypass.html
x_refsource_MISC
Hyperlink: https://www.dahuasecurity.com/support/cybersecurity/details/957
Resource:
x_refsource_MISC
Hyperlink: http://seclists.org/fulldisclosure/2021/Oct/13
Resource:
mailing-list
x_refsource_FULLDISC
Hyperlink: http://packetstormsecurity.com/files/164423/Dahua-Authentication-Bypass.html
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.dahuasecurity.com/support/cybersecurity/details/957
x_refsource_MISC
x_transferred
http://seclists.org/fulldisclosure/2021/Oct/13
mailing-list
x_refsource_FULLDISC
x_transferred
http://packetstormsecurity.com/files/164423/Dahua-Authentication-Bypass.html
x_refsource_MISC
x_transferred
Hyperlink: https://www.dahuasecurity.com/support/cybersecurity/details/957
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://seclists.org/fulldisclosure/2021/Oct/13
Resource:
mailing-list
x_refsource_FULLDISC
x_transferred
Hyperlink: http://packetstormsecurity.com/files/164423/Dahua-Authentication-Bypass.html
Resource:
x_refsource_MISC
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
kev
dateAdded:
2024-08-21
reference:
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-33045
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
CVE-2021-33045 added to CISA KEV2024-08-21 00:00:00
Event: CVE-2021-33045 added to CISA KEV
Date: 2024-08-21 00:00:00
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cybersecurity@dahuatech.com
Published At:15 Sep, 2021 | 22:15
Updated At:24 Feb, 2025 | 15:01

The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
2024-08-212024-09-11Dahua IP Camera Authentication Bypass VulnerabilityApply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Date Added: 2024-08-21
Due Date: 2024-09-11
Vulnerability Name: Dahua IP Camera Authentication Bypass Vulnerability
Required Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Metrics
TypeVersionBase scoreBase severityVector
Primary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary2.010.0HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
Type: Primary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 10.0
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

Dahua Technology Co., Ltd
dahuasecurity
>>ipc-hum7xxx_firmware>>Versions before 2.820.0000000.5.r.210705(exclusive)
cpe:2.3:o:dahuasecurity:ipc-hum7xxx_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>ipc-hum7xxx>>-
cpe:2.3:h:dahuasecurity:ipc-hum7xxx:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>ipc-hx3xxx_firmware>>Versions before 2.800.0000000.29.r.210630(exclusive)
cpe:2.3:o:dahuasecurity:ipc-hx3xxx_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>ipc-hx3xxx>>-
cpe:2.3:h:dahuasecurity:ipc-hx3xxx:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>ipc-hx5xxx_firmware>>Versions before 2.820.0000000.5.r.210705(exclusive)
cpe:2.3:o:dahuasecurity:ipc-hx5xxx_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>ipc-hx5xxx>>-
cpe:2.3:h:dahuasecurity:ipc-hx5xxx:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>nvr-1xxx_firmware>>Versions before 4.001.0000005.1.r.210709(exclusive)
cpe:2.3:o:dahuasecurity:nvr-1xxx_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>nvr-1xxx>>-
cpe:2.3:h:dahuasecurity:nvr-1xxx:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>nvr-2xxx_firmware>>Versions before 4.001.0000000.1.r.210710(exclusive)
cpe:2.3:o:dahuasecurity:nvr-2xxx_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>nvr-2xxx>>-
cpe:2.3:h:dahuasecurity:nvr-2xxx:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>nvr-4xxx_firmware>>Versions before 4.001.0000005.1.r.210713(exclusive)
cpe:2.3:o:dahuasecurity:nvr-4xxx_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>nvr-4xxx>>-
cpe:2.3:h:dahuasecurity:nvr-4xxx:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>nvr-5xxx_firmware>>Versions before 4.001.0000000.0.r.210710(exclusive)
cpe:2.3:o:dahuasecurity:nvr-5xxx_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>nvr-5xxx>>-
cpe:2.3:h:dahuasecurity:nvr-5xxx:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>nvr-6xx_firmware>>Versions before 4.001.0000001.1.r.210716(exclusive)
cpe:2.3:o:dahuasecurity:nvr-6xx_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>nvr-6xx>>-
cpe:2.3:h:dahuasecurity:nvr-6xx:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>vth-542xh_firmware>>Versions before 4.500.0000002.0.r.210715(exclusive)
cpe:2.3:o:dahuasecurity:vth-542xh_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>vth-542xh>>-
cpe:2.3:h:dahuasecurity:vth-542xh:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>vto-65xxx_firmware>>Versions before 4.300.0000004.0.r.210715(exclusive)
cpe:2.3:o:dahuasecurity:vto-65xxx_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>vto-65xxx>>-
cpe:2.3:h:dahuasecurity:vto-65xxx:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>vto-75x95x_firmware>>Versions before 4.300.0000003.0.r.210714(exclusive)
cpe:2.3:o:dahuasecurity:vto-75x95x_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>vto-75x95x>>-
cpe:2.3:h:dahuasecurity:vto-75x95x:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>xvr-4x04_firmware>>-
cpe:2.3:o:dahuasecurity:xvr-4x04_firmware:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>xvr-4x04>>-
cpe:2.3:h:dahuasecurity:xvr-4x04:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>xvr-4x08_firmware>>Versions before 4.001.0000001.1.r.210709(exclusive)
cpe:2.3:o:dahuasecurity:xvr-4x08_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>xvr-4x08>>-
cpe:2.3:h:dahuasecurity:xvr-4x08:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>xvr-4x04_firmware>>Versions before 4.001.0000001.1.r.210709(exclusive)
cpe:2.3:o:dahuasecurity:xvr-4x04_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>xvr-4x04>>-
cpe:2.3:h:dahuasecurity:xvr-4x04:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>xvr-5x04_firmware>>Versions before 4.001.0000003.1.r.210710(exclusive)
cpe:2.3:o:dahuasecurity:xvr-5x04_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>xvr-5x04>>-
cpe:2.3:h:dahuasecurity:xvr-5x04:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>xvr-5x08_firmware>>Versions before 4.001.0000003.1.r.210710(exclusive)
cpe:2.3:o:dahuasecurity:xvr-5x08_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>xvr-5x08>>-
cpe:2.3:h:dahuasecurity:xvr-5x08:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>xvr-5x16_firmware>>Versions before 4.001.0000003.1.r.210710(exclusive)
cpe:2.3:o:dahuasecurity:xvr-5x16_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>xvr-5x16>>-
cpe:2.3:h:dahuasecurity:xvr-5x16:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>xvr-7x16_firmware>>Versions before 4.001.0000003.1.r.210710(exclusive)
cpe:2.3:o:dahuasecurity:xvr-7x16_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>xvr-7x16>>-
cpe:2.3:h:dahuasecurity:xvr-7x16:-:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>xvr-7x32_firmware>>Versions before 4.001.0000003.1.r.210710(exclusive)
cpe:2.3:o:dahuasecurity:xvr-7x32_firmware:*:*:*:*:*:*:*:*
Dahua Technology Co., Ltd
dahuasecurity
>>xvr-7x32>>-
cpe:2.3:h:dahuasecurity:xvr-7x32:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-287Primarynvd@nist.gov
CWE ID: CWE-287
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://packetstormsecurity.com/files/164423/Dahua-Authentication-Bypass.htmlcybersecurity@dahuatech.com
Exploit
Third Party Advisory
VDB Entry
http://seclists.org/fulldisclosure/2021/Oct/13cybersecurity@dahuatech.com
Exploit
Mailing List
Third Party Advisory
https://www.dahuasecurity.com/support/cybersecurity/details/957cybersecurity@dahuatech.com
Vendor Advisory
http://packetstormsecurity.com/files/164423/Dahua-Authentication-Bypass.htmlaf854a3a-2127-422b-91ae-364da2661108
Exploit
Third Party Advisory
VDB Entry
http://seclists.org/fulldisclosure/2021/Oct/13af854a3a-2127-422b-91ae-364da2661108
Exploit
Mailing List
Third Party Advisory
https://www.dahuasecurity.com/support/cybersecurity/details/957af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
Hyperlink: http://packetstormsecurity.com/files/164423/Dahua-Authentication-Bypass.html
Source: cybersecurity@dahuatech.com
Resource:
Exploit
Third Party Advisory
VDB Entry
Hyperlink: http://seclists.org/fulldisclosure/2021/Oct/13
Source: cybersecurity@dahuatech.com
Resource:
Exploit
Mailing List
Third Party Advisory
Hyperlink: https://www.dahuasecurity.com/support/cybersecurity/details/957
Source: cybersecurity@dahuatech.com
Resource:
Vendor Advisory
Hyperlink: http://packetstormsecurity.com/files/164423/Dahua-Authentication-Bypass.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Third Party Advisory
VDB Entry
Hyperlink: http://seclists.org/fulldisclosure/2021/Oct/13
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Mailing List
Third Party Advisory
Hyperlink: https://www.dahuasecurity.com/support/cybersecurity/details/957
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

833Records found

CVE-2021-33044
Matching Score-10
Assigner-Dahua Technologies
ShareView Details
Matching Score-10
Assigner-Dahua Technologies
CVSS Score-9.8||CRITICAL
EPSS-94.27% / 99.93%
||
7 Day CHG~0.00%
Published-15 Sep, 2021 | 21:36
Updated-30 Jul, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2024-09-11||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.

Action-Not Available
Vendor-n/aDahua Technology Co., Ltd
Product-ipc-hum7xxxsd6al_firmwaretpc-bf5x01vto-65xxxsd52c_firmwaresd22vth-542xhtpc-bf1241_firmwarevto-75x95xtpc-pt8x21bsd1a1tpc-bf1241vto-75x95x_firmwaretpc-bf5x21_firmwaresd1a1_firmwaresd22_firmwaresd6alipc-hx3xxxsd50tpc-bf5x21tpc-sd8x21_firmwareipc-hum7xxx_firmwarevth-542xh_firmwaresd41_firmwarevto-65xxx_firmwaresd52cipc-hx5xxx_firmwaretpc-pt8x21b_firmwaresd41tpc-sd2221_firmwareipc-hx3xxx_firmwaretpc-bf2221ipc-hx5xxxtpc-sd8x21tpc-sd2221tpc-bf2221_firmwaretpc-bf5x01_firmwaresd50_firmwareSome Dahua IP Camera, Video Intercom, PTZ Dome Camera, Thermal Camera devicesIP Camera Firmware
CWE ID-CWE-287
Improper Authentication
CVE-2021-33046
Matching Score-10
Assigner-Dahua Technologies
ShareView Details
Matching Score-10
Assigner-Dahua Technologies
CVSS Score-9.8||CRITICAL
EPSS-0.59% / 68.17%
||
7 Day CHG~0.00%
Published-13 Jan, 2022 | 20:27
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Some Dahua products have access control vulnerability in the password reset process. Attackers can exploit this vulnerability through specific deployments to reset device passwords.

Action-Not Available
Vendor-n/aDahua Technology Co., Ltd
Product-hcvr8xxxsd50_firmwaretpc-sd2221tpc-pt8x21xipc-hx2xxx_firmwarevtox20xf_firmwareipc-hx1xxxnvr5xxxtpc-bf2221_firmwarenvr1xxx_firmwaresd6alsd1a1hcvr8xxx_firmwareipc-hx5\(4\)\(3\)xxxvtox20xfsd52c_firmwaresd22_firmwaretpc-pt8x21x_firmwaresd6al_firmwarehcvr7xxxnvr4xxx_firmwareasc2204cnvr4xxxxvr7xxxsd52cipc-hx5xxx_firmwaresd49_firmwaretpc-sd8x21_firmwaresd1a1_firmwareipc-hx3xxx_firmwaretpc-bf5x01_firmwaretpc-bf1241tpc-sd8x21tpc-sd2221_firmwarenvr2xxx_firmwarenvr1xxxxvr4xxx_firmwaretpc-bf5x01hcvr7xxx_firmwarexvr5xxxsd49nvr2xxxipc-hx3xxxxvr5xxx_firmwaresd22tpc-bf2221ipc-hx5xxxtpc-bf1241_firmwarexvr4xxxxvr7xxx_firmwareipc-hx5\(4\)\(3\)xxx_firmwarenvr5xxx_firmwaresd50ipc-hx2xxxasc2204c_firmwareipc-hx1xxx_firmwareAccess control vulnerability found in some Dahua products
CWE ID-CWE-287
Improper Authentication
CVE-2017-6342
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.35% / 56.92%
||
7 Day CHG~0.00%
Published-27 Feb, 2017 | 07:25
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Dahua DHI-HCVR7216A-S3 devices with NVR Firmware 3.210.0001.10 2016-06-06, Camera Firmware 2.400.0000.28.R 2016-03-29, and SmartPSS Software 1.16.1 2017-01-19. When SmartPSS Software is launched, while on the login screen, the software in the background automatically logs in as admin. This allows sniffing sensitive information identified in CVE-2017-6341 without prior knowledge of the password. This is a different vulnerability than CVE-2013-6117.

Action-Not Available
Vendor-n/aDahua Technology Co., Ltd
Product-nvr_firmwaresmartpss_firmwarecamera_firmwaredhi-hcvr7216a-s3n/a
CWE ID-CWE-269
Improper Privilege Management
CVE-2020-9502
Matching Score-8
Assigner-Dahua Technologies
ShareView Details
Matching Score-8
Assigner-Dahua Technologies
CVSS Score-9.8||CRITICAL
EPSS-0.52% / 65.91%
||
7 Day CHG~0.00%
Published-13 May, 2020 | 15:21
Updated-04 Aug, 2024 | 10:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Some Dahua products with Build time before December 2019 have Session ID predictable vulnerabilities. During normal user access, an attacker can use the predicted Session ID to construct a data packet to attack the device.

Action-Not Available
Vendor-n/aDahua Technology Co., Ltd
Product-sd50_firmwaresd5a_firmwareipc-hxxx5x4x_firmwaresd1a_firmwareipc-hx2xxx_firmwaren52b5p_firmwaren54a4p_firmwaren52b2p_firmwaren42b1psd6alipc-hx5842hptz1a_firmwaresd52c_firmwareipc-hx7842hsd6al_firmwaresd52cn52b2pipc-hdbw1320e-wn42b1p_firmwaren54b2p_firmwaren52a4p_firmwaren52b3pipc-hx5842h_firmwaren54b2psd5aipc-hx7842h_firmwareptz1an42b3pn54a4pn52b3p_firmwaresd1an52a4pipc-hxxx5x4xn42b2p_firmwaren52b5pn42b2psd50ipc-hx2xxxn42b3p_firmwareipc-hdbw1320e-w_firmwareIPC-HX2XXX Series,IPC-HXXX5X4X Series,IPC-HX5842H,IPC-HX7842H,NVR 5x Series,NVR 4x Series,SD6AL Series,SD5A Series,SD1A Series,PTZ1A Series,SD50/52C Series,IPC-HFW1431S
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2023-3836
Matching Score-8
Assigner-VulDB
ShareView Details
Matching Score-8
Assigner-VulDB
CVSS Score-6.3||MEDIUM
EPSS-90.41% / 99.59%
||
7 Day CHG~0.00%
Published-22 Jul, 2023 | 18:00
Updated-02 Aug, 2024 | 07:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Dahua Smart Park Management unrestricted upload

A vulnerability classified as critical was found in Dahua Smart Park Management up to 20230713. This vulnerability affects unknown code of the file /emap/devicePoint_addImgIco?hasSubsystem=true. The manipulation of the argument upload leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-235162 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-Dahua Technology Co., Ltd
Product-smart_parking_managementSmart Park Management
CWE ID-CWE-434
Unrestricted Upload of File with Dangerous Type
CVE-2019-9677
Matching Score-8
Assigner-Dahua Technologies
ShareView Details
Matching Score-8
Assigner-Dahua Technologies
CVSS Score-9.8||CRITICAL
EPSS-0.64% / 69.58%
||
7 Day CHG~0.00%
Published-18 Sep, 2019 | 18:46
Updated-04 Aug, 2024 | 21:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The specific fields of CGI interface of some Dahua products are not strictly verified, an attacker can cause a buffer overflow by constructing malicious packets. Affected products include: IPC-HDW1X2X,IPC-HFW1X2X,IPC-HDW2X2X,IPC-HFW2X2X,IPC-HDW4X2X,IPC-HFW4X2X,IPC-HDBW4X2X,IPC-HDW5X2X,IPC-HFW5X2X for versions which Build time is before August 18, 2019.

Action-Not Available
Vendor-Dahua Technology Co., Ltd
Product-ipc-hdw1x2x_firmwareipc-hdw5x2x_firmwareipc-hfw4x2x_firmwareipc-hfw1x2x_firmwareipc-hfw2x2x_firmwareipc-hfw2x2xipc-hdbw4x2xipc-hfw4x2xipc-hdw4x2xipc-hfw5x2x_firmwareipc-hfw1x2xipc-hdw5x2xipc-hdw2x2x_firmwareipc-hdbw4x2x_firmwareipc-hdw2x2xipc-hdw4x2x_firmwareipc-hdw1x2xipc-hfw5x2xIPC-HDW1X2X,IPC-HFW1X2X,IPC-HDW2X2X,IPC-HFW2X2X,IPC-HDW4X2X,IPC-HFW4X2X,IPC-HDBW4X2X,IPC-HDW5X2X,IPC-HFW5X2X
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2013-5754
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-1.37% / 79.45%
||
7 Day CHG~0.00%
Published-17 Sep, 2013 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The authorization implementation on Dahua DVR appliances accepts a hash string representing the current date for the role of a master password, which makes it easier for remote attackers to obtain administrative access and change the administrator password via requests involving (1) ActiveX, (2) a standalone client, or (3) unspecified other vectors, a different vulnerability than CVE-2013-3612.

Action-Not Available
Vendor-n/aDahua Technology Co., Ltd
Product-dvr3224ldvr5108hedvr0404hd-sdvr1604hf-u-edvr2404hf-sdvr5104hedvr2108hdvr2404lf-aldvr2108cdvr2104hedvr6404lf-sdvr5104cdvr0404hf-u-edvr5416dvr1604hf-a-edvr5216advr5204ldvr0404hf-s-edvr5108hdvr5408dvr0804hd-sdvr0404hd-ldvr2108hcdvr5116cdvr5804dvr5204advr2104hdvr0804hd-ldvr5208advr1604hf-al-edvr1604hd-ldvr5116hedvr0404hf-a-edvr1604hf-s-edvr5808dvr1604hd-sdvr0804hf-l-edvr0404hd-advr5208ldvr2104cdvr3232ldvr3204lf-aldvr0804hf-u-edvr1604hf-l-edvr2108hedvr0804dvr2116hcdvr3204hf-sdvr5216ldvr0804hf-al-edvr2404lf-sdvr3204lf-sdvr0404hd-udvr5404dvr5816dvr5108cdvr2116hdvr2116cdvr5116hdvr0804hf-s-edvr0404hf-al-edvr0804hf-a-edvr2116hedvr2104hcdvr5104hn/a
CVE-2013-3612
Matching Score-8
Assigner-CERT/CC
ShareView Details
Matching Score-8
Assigner-CERT/CC
CVSS Score-10||HIGH
EPSS-14.69% / 94.22%
||
7 Day CHG~0.00%
Published-17 Sep, 2013 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dahua DVR appliances have a hardcoded password for (1) the root account and (2) an unspecified "backdoor" account, which makes it easier for remote attackers to obtain administrative access via authorization requests involving (a) ActiveX, (b) a standalone client, or (c) unknown other vectors.

Action-Not Available
Vendor-n/aDahua Technology Co., Ltd
Product-dvr3224ldvr5108hedvr0404hd-sdvr1604hf-u-edvr2404hf-sdvr5104hedvr2108hdvr2404lf-aldvr2108cdvr2104hedvr6404lf-sdvr5104cdvr0404hf-u-edvr5416dvr1604hf-a-edvr5216advr5204ldvr0404hf-s-edvr5108hdvr5408dvr0804hd-sdvr0404hd-ldvr2108hcdvr5116cdvr5804dvr5204advr2104hdvr0804hd-ldvr5208advr1604hf-al-edvr1604hd-ldvr5116hedvr0404hf-a-edvr1604hf-s-edvr5808dvr1604hd-sdvr0804hf-l-edvr0404hd-advr5208ldvr2104cdvr3232ldvr3204lf-aldvr0804hf-u-edvr1604hf-l-edvr2108hedvr0804dvr2116hcdvr3204hf-sdvr5216ldvr0804hf-al-edvr2404lf-sdvr3204lf-sdvr0404hd-udvr5404dvr5816dvr5108cdvr2116hdvr2116cdvr5116hdvr0804hf-s-edvr0404hf-al-edvr0804hf-a-edvr2116hedvr2104hcdvr5104hn/a
CVE-2024-39950
Matching Score-8
Assigner-Dahua Technologies
ShareView Details
Matching Score-8
Assigner-Dahua Technologies
CVSS Score-8.6||HIGH
EPSS-0.29% / 51.94%
||
7 Day CHG~0.00%
Published-31 Jul, 2024 | 03:45
Updated-19 Aug, 2024 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been found in Dahua products. Attackers can send carefully crafted data packets to the interface with vulnerabilities to initiate device initialization.

Action-Not Available
Vendor-Dahua Technology Co., Ltd
Product-nvr4216-16p-4ks3nvr4216-16p-4ks2\/l_firmwarenvr4108hs-4ks3\(960g\)nvr4208-8p-4ks2\/l_firmwarenvr4108hs-p-4ks2\/lnvr4232-4ks2\/lnvr4104-4ks2\/l_firmwarenvr4832-16p-4ks2\/invr4108hs-8p-4ks2\/lnvr4416-16p-4ks2\/invr4216-4ks2\/l_firmwarenvr4104-4ks3_firmwarenvr4116-8p-4ks2\/l_firmwarenvr4104hs-p-4ks3_firmwarenvr4108-4ks2\/l_firmwarenvr4104hs-p-4ks2\/l_firmwarenvr4232-4ks2\/l_firmwarenvr4432-4ks2\/iipc-hfs8849g-z3-lednvr4104-p-4ks3nvr4116-4ks3nvr4208-4ks3nvr4104hs-4ks3nvr4208-8p-4ks3_firmwarenvr4104-p-4ks2\/l_firmwarenvr4116hs-4ks3ipc-hfs8849g-z3-led_firmwarenvr4104-p-4ks3\(960g\)nvr4416-4ks2\/i_firmwarenvr4216-4ks3_firmwarenvr4832-4ks2\/invr4816-4ks2\/i_firmwarenvr4232-16p-4ks3_firmwarenvr4208-8p-4ks3nvr4204-p-4ks3nvr4832-16p-4ks2\/i_firmwarenvr4108hs-4ks2\/lnvr4104-4ks2\/lnvr4108hs-p-4ks3nvr4108hs-4ks3_firmwarenvr4108hs-4ks3nvr4108-p-4ks3_firmwarenvr4432-16p-4ks2\/invr4104hs-p-4ks2\/lnvr4832-4ks2\/i_firmwarenvr4416-16p-4ks2\/i_firmwarenvr4104-p-4ks3_firmwarenvr4104hs-p-4ks3nvr4232-4ks3nvr4432-16p-4ks2\/i_firmwarenvr4208-4ks2\/l_firmwarenvr4232-16p-4ks2\/lnvr4116-4ks3_firmwarenvr4104-4ks3nvr4116hs-4ks2\/lnvr4104-p-4ks3\(960g\)_firmwareipc-hfs8449g-z7-led_firmwareipc-hfs8449g-z7-lednvr4204-4ks2\/l_firmwarenvr4108-p-4ks2\/lnvr4104hs-4ks3\(960g\)nvr4216-16p-4ks3_firmwarenvr4108hs-p-4ks2\/l_firmwarenvr4108hs-4ks2\/l_firmwarenvr4104hs-4ks2\/lnvr4108hs-8p-4ks3nvr4208-4ks3_firmwarenvr4116hs-4ks2\/l_firmwarenvr4116hs-8p-4ks2\/lnvr4104-p-4ks2\/lnvr4116hs-4ks3_firmwarenvr4104hs-p-4ks3\(960g\)nvr4108hs-8p-4ks2\/l_firmwarenvr4816-4ks2\/invr4816-16p-4ks2\/invr4108hs-p-4ks3_firmwarenvr4204-p-4ks2\/lnvr4104hs-4ks3_firmwarenvr4204-4ks2\/lnvr4108-4ks3nvr4204-p-4ks2\/l_firmwarenvr4108-8p-4ks2\/lnvr4208-8p-4ks2\/lnvr4108-8p-4ks3_firmwarenvr4204-4ks3nvr4204-p-4ks3_firmwarenvr4108-8p-4ks2\/l_firmwarenvr4416-4ks2\/invr4116-4ks2\/l_firmwarenvr4232-16p-4ks3nvr4232-16p-4ks2\/l_firmwarenvr4108-p-4ks2\/l_firmwarenvr4104hs-p-4ks3\(960g\)_firmwarenvr4232-4ks3_firmwarenvr4108-4ks3_firmwarenvr4204-4ks3_firmwarenvr4816-16p-4ks2\/i_firmwarenvr4116-8p-4ks3nvr4108-p-4ks3nvr4104hs-4ks3\(960g\)_firmwarenvr4104hs-4ks2\/l_firmwarenvr4432-4ks2\/i_firmwarenvr4108-8p-4ks3nvr4108-4ks2\/lnvr4116-8p-4ks3_firmwarenvr4116-4ks2\/lnvr4116hs-8p-4ks3nvr4116-8p-4ks2\/lnvr4208-4ks2\/lnvr4216-16p-4ks2\/lnvr4216-4ks3nvr4216-4ks2\/lnvr4108hs-8p-4ks3_firmwarenvr4108hs-4ks3\(960g\)_firmwarenvr4116hs-8p-4ks3_firmwarenvr4116hs-8p-4ks2\/l_firmwareNVR4XXX and IPC-HX8XXXipc-hf8xxx_firmwareipc-hfw8xxxnvr4832-i
CWE ID-CWE-20
Improper Input Validation
CVE-2017-9316
Matching Score-6
Assigner-Dahua Technologies
ShareView Details
Matching Score-6
Assigner-Dahua Technologies
CVSS Score-6.5||MEDIUM
EPSS-4.43% / 88.62%
||
7 Day CHG~0.00%
Published-27 Nov, 2017 | 17:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Firmware upgrade authentication bypass vulnerability was found in Dahua IPC-HDW4300S and some IP products. The vulnerability was caused by internal Debug function. This particular function was used for problem analysis and performance tuning during product development phase. It allowed the device to receive only specific data (one direction, no transmit) and therefore it was not involved in any instance of collecting user privacy data or allowing remote code execution.

Action-Not Available
Vendor-Dahua Technology Co., Ltd
Product-ipc-hdw4x00nvr11hsipc-hdbw5x00_firmwareipc-hfw5x00_firmwareipc-hfw4x00ipc-hdw4300sipc-hdbw5x00ipc-hdw5x00ipc-hf5x00nvr11hs_firmwareipc-hfw4x00_firmwareipc-hdbw4x00ipc-hdw5x00_firmwareipc-hdbw4x00_firmwareipc-hdw4300s_firmwareipc-hdw4x00_firmwareipc-hfw5x00ipc-hf5x00_firmwareIPC-HDW4300S\NVR11HS\IPC-HFW4X00\IPC-HDW4X00\IPC-HDBW4X00\IPC-HF5X00\IPC-HFW5X00\IPC-HDW5X00\IPC-HDBW5X00\NVR11HS
CWE ID-CWE-287
Improper Authentication
CVE-2017-9314
Matching Score-6
Assigner-Dahua Technologies
ShareView Details
Matching Score-6
Assigner-Dahua Technologies
CVSS Score-8.8||HIGH
EPSS-0.31% / 53.79%
||
7 Day CHG~0.00%
Published-13 Nov, 2017 | 16:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Authentication vulnerability found in Dahua NVR models NVR50XX, NVR52XX, NVR54XX, NVR58XX with software before DH_NVR5xxx_Eng_P_V2.616.0000.0.R.20171102. Attacker could exploit this vulnerability to gain access to additional operations by means of forging json message.

Action-Not Available
Vendor-Dahua Technology Co., Ltd
Product-nvr5416-16p-4ks2nvr5416-4ks2_firmwarenvr5232-8p-4ks2_firmwarenvr5464-16p-4ks2_firmwarenvr5424-24p-4ks2nvr5464-4ks2_firmwarenvr5864-16p-4ks2nvr5816-16p-4ks2nvr5216-8p-4ks2_firmwarenvr5424-24p-4ks2_firmwarenvr5208-4ks2_firmwarenvr5816-4ks2_firmwarenvr5232-16p-4ks2nvr5224-24p-4ks2nvr5464-16p-4ks2nvr5224-24p-4ks2_firmwarenvr5216-4ks2_firmwarenvr5232-4ks2_firmwarenvr5864-16p-4ks2_firmwarenvr5232-8p-4ks2nvr5208-4ks2nvr5208-8p-4ks2_firmwarenvr5216-16p-4ks2_firmwarenvr5432-16p-4ks2nvr5216-4ks2nvr5832-16p-4ks2nvr5232-16p-4ks2_firmwarenvr5232-4ks2nvr5816-4ks2nvr5416-16p-4ks2_firmwarenvr5208-8p-4ks2nvr5864-4ks2_firmwarenvr5832-4ks2nvr5216-8p-4ks2nvr5816-16p-4ks2_firmwarenvr5432-4ks2_firmwarenvr5216-16p-4ks2nvr5416-4ks2nvr5432-16p-4ks2_firmwarenvr5432-4ks2nvr5464-4ks2nvr5832-16p-4ks2_firmwarenvr5832-4ks2_firmwarenvr5864-4ks2NVR50XX, VR52XX, VR54XX, VR58XX
CWE ID-CWE-287
Improper Authentication
CVE-2017-6343
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-2.35% / 84.28%
||
7 Day CHG~0.00%
Published-27 Feb, 2017 | 07:25
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The web interface on Dahua DHI-HCVR7216A-S3 devices with NVR Firmware 3.210.0001.10 2016-06-06, Camera Firmware 2.400.0000.28.R 2016-03-29, and SmartPSS Software 1.16.1 2017-01-19 allows remote attackers to obtain login access by leveraging knowledge of the MD5 Admin Hash without knowledge of the corresponding password, a different vulnerability than CVE-2013-6117.

Action-Not Available
Vendor-n/aDahua Technology Co., Ltd
Product-nvr_firmwaresmartpss_firmwarecamera_firmwaredhi-hcvr7216a-s3n/a
CWE ID-CWE-287
Improper Authentication
CVE-2013-6117
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-89.20% / 99.52%
||
7 Day CHG~0.00%
Published-11 Jul, 2014 | 19:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

Action-Not Available
Vendor-n/aDahua Technology Co., Ltd
Product-dvr_firmwaren/a
CWE ID-CWE-287
Improper Authentication
CVE-2013-3613
Matching Score-6
Assigner-CERT/CC
ShareView Details
Matching Score-6
Assigner-CERT/CC
CVSS Score-7.8||HIGH
EPSS-11.44% / 93.32%
||
7 Day CHG~0.00%
Published-17 Sep, 2013 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dahua DVR appliances do not properly restrict UPnP requests, which makes it easier for remote attackers to obtain access via vectors involving a replay attack against the TELNET port.

Action-Not Available
Vendor-n/aDahua Technology Co., Ltd
Product-dvr3224ldvr5108hedvr0404hd-sdvr1604hf-u-edvr2404hf-sdvr5104hedvr2108hdvr2404lf-aldvr2108cdvr2104hedvr6404lf-sdvr5104cdvr0404hf-u-edvr5416dvr1604hf-a-edvr5216advr5204ldvr0404hf-s-edvr5108hdvr5408dvr0804hd-sdvr0404hd-ldvr2108hcdvr5116cdvr5804dvr5204advr2104hdvr0804hd-ldvr5208advr1604hf-al-edvr1604hd-ldvr5116hedvr0404hf-a-edvr1604hf-s-edvr5808dvr1604hd-sdvr0804hf-l-edvr0404hd-advr5208ldvr2104cdvr3232ldvr3204lf-aldvr0804hf-u-edvr1604hf-l-edvr2108hedvr0804dvr2116hcdvr3204hf-sdvr5216ldvr0804hf-al-edvr2404lf-sdvr3204lf-sdvr0404hd-udvr5404dvr5816dvr5108cdvr2116hdvr2116cdvr5116hdvr0804hf-s-edvr0404hf-al-edvr0804hf-a-edvr2116hedvr2104hcdvr5104hn/a
CWE ID-CWE-287
Improper Authentication
CVE-2022-3465
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-7.3||HIGH
EPSS-0.08% / 24.83%
||
7 Day CHG~0.00%
Published-12 Oct, 2022 | 00:00
Updated-14 Apr, 2025 | 15:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Mediabridge Medialink index.asp improper authentication

A vulnerability classified as critical was found in Mediabridge Medialink. This vulnerability affects unknown code of the file /index.asp. The manipulation leads to improper authentication. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-210700.

Action-Not Available
Vendor-mediabridgeproductsMediabridge
Product-mlwr-ac1200r_firmwaremlwr-ac1200rMedialink
CWE ID-CWE-287
Improper Authentication
CVE-2011-1519
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-14.00% / 94.08%
||
7 Day CHG~0.00%
Published-25 Mar, 2011 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The remote console in the Server Controller in IBM Lotus Domino 7.x and 8.x verifies credentials against a file located at a UNC share pathname specified by the client, which allows remote attackers to bypass authentication, and consequently execute arbitrary code, by placing this pathname in the COOKIEFILE field. NOTE: this might overlap CVE-2011-0920.

Action-Not Available
Vendor-n/aIBM Corporation
Product-lotus_dominon/a
CWE ID-CWE-287
Improper Authentication
CVE-2011-0383
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-10||HIGH
EPSS-4.70% / 88.95%
||
7 Day CHG+1.04%
Published-25 Feb, 2011 | 11:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Java Servlet framework on Cisco TelePresence Recording Server devices with software 1.6.x before 1.6.2 and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x does not require administrative authentication for unspecified actions, which allows remote attackers to execute arbitrary code via a crafted request, aka Bug IDs CSCtf42005 and CSCtf42008.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-telepresence_recording_server_softwaretelepresence_recording_servertelepresence_multipoint_switchtelepresence_multipoint_switch_softwaren/a
CWE ID-CWE-287
Improper Authentication
CVE-2021-21994
Matching Score-4
Assigner-VMware by Broadcom
ShareView Details
Matching Score-4
Assigner-VMware by Broadcom
CVSS Score-9.8||CRITICAL
EPSS-0.10% / 28.33%
||
7 Day CHG-0.01%
Published-13 Jul, 2021 | 18:05
Updated-03 Aug, 2024 | 18:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SFCB (Small Footprint CIM Broker) as used in ESXi has an authentication bypass vulnerability. A malicious actor with network access to port 5989 on ESXi may exploit this issue to bypass SFCB authentication by sending a specially crafted request.

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)
Product-esxicloud_foundationVMware ESXi and VMware Cloud Foundation
CWE ID-CWE-287
Improper Authentication
CVE-2021-22507
Matching Score-4
Assigner-OpenText (formerly Micro Focus)
ShareView Details
Matching Score-4
Assigner-OpenText (formerly Micro Focus)
CVSS Score-9.8||CRITICAL
EPSS-0.85% / 73.95%
||
7 Day CHG~0.00%
Published-08 Apr, 2021 | 17:35
Updated-03 Aug, 2024 | 18:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Authentication bypass vulnerability in Micro Focus Operations Bridge Manager affects versions 2019.05, 2019.11, 2020.05 and 2020.10. The vulnerability could allow remote attackers to bypass user authentication and get unauthorized access.

Action-Not Available
Vendor-n/aMicro Focus International Limited
Product-operations_bridge_managerOperations Bridge Manager
CWE ID-CWE-287
Improper Authentication
CVE-2024-12603
Matching Score-4
Assigner-TECNO Mobile Limited
ShareView Details
Matching Score-4
Assigner-TECNO Mobile Limited
CVSS Score-9.8||CRITICAL
EPSS-0.23% / 45.91%
||
7 Day CHG+0.01%
Published-13 Dec, 2024 | 02:54
Updated-14 Mar, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A logic vulnerability in the the mobile application (com.transsion.applock) can lead to bypassing the application password.

Action-Not Available
Vendor-TECNO MOBILE LIMITED
Product-com.transsion.applock
CWE ID-CWE-287
Improper Authentication
CVE-2022-3674
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-7.3||HIGH
EPSS-0.08% / 24.19%
||
7 Day CHG~0.00%
Published-26 Oct, 2022 | 00:00
Updated-14 Apr, 2025 | 15:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SourceCodester Sanitization Management System missing authentication

A vulnerability has been found in SourceCodester Sanitization Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to missing authentication. The attack can be launched remotely. The identifier VDB-212017 was assigned to this vulnerability.

Action-Not Available
Vendor-SourceCodesteroretnom23
Product-sanitization_management_systemSanitization Management System
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-22869
Matching Score-4
Assigner-GitHub, Inc. (Products Only)
ShareView Details
Matching Score-4
Assigner-GitHub, Inc. (Products Only)
CVSS Score-9.8||CRITICAL
EPSS-0.39% / 59.24%
||
7 Day CHG~0.00%
Published-24 Sep, 2021 | 17:50
Updated-03 Aug, 2024 | 18:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper access control in GitHub Enterprise Server allows self-hosted runners to execute outside their control group

An improper access control vulnerability in GitHub Enterprise Server allowed a workflow job to execute in a self-hosted runner group it should not have had access to. This affects customers using self-hosted runner groups for access control. A repository with access to one enterprise runner group could access all of the enterprise runner groups within the organization because of improper authentication checks during the request. This could cause code to be run unintentionally by the incorrect runner group. This vulnerability affected GitHub Enterprise Server versions from 3.0.0 to 3.0.15 and 3.1.0 to 3.1.7 and was fixed in 3.0.16 and 3.1.8 releases.

Action-Not Available
Vendor-GitHub, Inc.
Product-enterprise_serverGitHub Enterprise Server
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CWE ID-CWE-287
Improper Authentication
CVE-2021-21998
Matching Score-4
Assigner-VMware by Broadcom
ShareView Details
Matching Score-4
Assigner-VMware by Broadcom
CVSS Score-9.8||CRITICAL
EPSS-0.49% / 64.58%
||
7 Day CHG~0.00%
Published-23 Jun, 2021 | 11:10
Updated-03 Aug, 2024 | 18:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VMware Carbon Black App Control 8.0, 8.1, 8.5 prior to 8.5.8, and 8.6 prior to 8.6.2 has an authentication bypass. A malicious actor with network access to the VMware Carbon Black App Control management server might be able to obtain administrative access to the product without the need to authenticate.

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)
Product-carbon_black_app_controlVMware Carbon Black App Control (AppC)
CWE ID-CWE-287
Improper Authentication
CVE-2018-20675
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.42% / 61.19%
||
7 Day CHG~0.00%
Published-09 Jan, 2019 | 00:00
Updated-17 Sep, 2024 | 01:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

D-Link DIR-822 C1 before v3.11B01Beta, DIR-822-US C1 before v3.11B01Beta, DIR-850L A* before v1.21B08Beta, DIR-850L B* before v2.22B03Beta, and DIR-880L A* before v1.20B02Beta devices allow authentication bypass.

Action-Not Available
Vendor-n/aD-Link Corporation
Product-dir-822-usdir-850ldir-880ldir-850l_firmwaredir-822_firmwaredir-880l_firmwaredir-822dir-822-us_firmwaren/a
CWE ID-CWE-287
Improper Authentication
CVE-2021-25315
Matching Score-4
Assigner-SUSE
ShareView Details
Matching Score-4
Assigner-SUSE
CVSS Score-9.8||CRITICAL
EPSS-0.16% / 37.95%
||
7 Day CHG~0.00%
Published-03 Mar, 2021 | 09:55
Updated-16 Sep, 2024 | 21:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
salt-api unauthenticated remote code execution

CWE - CWE-287: Improper Authentication vulnerability in SUSE Linux Enterprise Server 15 SP 3; openSUSE Tumbleweed allows local attackers to execute arbitrary code via salt without the need to specify valid credentials. This issue affects: SUSE Linux Enterprise Server 15 SP 3 salt versions prior to 3002.2-3. openSUSE Tumbleweed salt version 3002.2-2.1 and prior versions. This issue affects: SUSE Linux Enterprise Server 15 SP 3 salt versions prior to 3002.2-3. openSUSE Tumbleweed salt version 3002.2-2.1 and prior versions.

Action-Not Available
Vendor-saltstackopenSUSESUSE
Product-tumbleweedsuse_linux_enterprise_serversaltTumbleweedSUSE Linux Enterprise Server 15 SP 3
CWE ID-CWE-287
Improper Authentication
CVE-2024-12919
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-9.8||CRITICAL
EPSS-0.23% / 46.00%
||
7 Day CHG~0.00%
Published-14 Jan, 2025 | 09:21
Updated-22 Jan, 2025 | 17:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction <= 2.13.7 - Authentication Bypass via pms_payment_id

The Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 2.13.7. This is due to the pms_pb_payment_redirect_link function using the user-controlled value supplied via the 'pms_payment_id' parameter to authenticate users without any further identity validation. This makes it possible for unauthenticated attackers with knowledge of a valid payment ID to log in as any user who has made a purchase on the targeted site.

Action-Not Available
Vendor-cozmoslabsmadalinungureanu
Product-membership_\&_content_restriction_-_paid_member_subscriptionsPaid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction
CWE ID-CWE-287
Improper Authentication
CVE-2021-21952
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-9.4||CRITICAL
EPSS-0.46% / 63.11%
||
7 Day CHG~0.00%
Published-22 Dec, 2021 | 18:07
Updated-03 Aug, 2024 | 18:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An authentication bypass vulnerability exists in the CMD_DEVICE_GET_RSA_KEY_REQUEST functionality of the home_security binary of Anker Eufy Homebase 2 2.1.6.9h. A specially-crafted set of network packets can lead to increased privileges.

Action-Not Available
Vendor-ankern/a
Product-eufy_homebase_2_firmwareeufy_homebase_2Anker"
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CWE ID-CWE-287
Improper Authentication
CVE-2019-18315
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-9.8||CRITICAL
EPSS-1.02% / 76.34%
||
7 Day CHG~0.00%
Published-12 Dec, 2019 | 19:08
Updated-05 Aug, 2024 | 01:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). An attacker with network access to the Application Server could gain remote code execution by sending specifically crafted packets to 8888/tcp. Please note that an attacker needs to have network access to the Application Server in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.

Action-Not Available
Vendor-Siemens AG
Product-sppa-t3000_application_serverSPPA-T3000 Application Server
CWE ID-CWE-287
Improper Authentication
CVE-2024-1148
Matching Score-4
Assigner-OpenText (formerly Micro Focus)
ShareView Details
Matching Score-4
Assigner-OpenText (formerly Micro Focus)
CVSS Score-9.8||CRITICAL
EPSS-0.09% / 26.84%
||
7 Day CHG~0.00%
Published-21 Mar, 2024 | 07:34
Updated-11 Nov, 2024 | 20:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Weak Access Control - Arbitrary file upload

Weak access control in OpenText PVCS Version Manager allows potential bypassing of authentication and uploading of files.

Action-Not Available
Vendor-Open Text Corporation
Product-PVCS Version Managerpvcs_version_manager
CWE ID-CWE-287
Improper Authentication
CVE-2021-21513
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-8.6||HIGH
EPSS-0.51% / 65.19%
||
7 Day CHG~0.00%
Published-02 Mar, 2021 | 16:00
Updated-16 Sep, 2024 | 20:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell EMC OpenManage Server Administrator (OMSA) version 9.5 Microsoft Windows installations with Distributed Web Server (DWS) enabled configuration contains an authentication bypass vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability to gain admin access on the affected system.

Action-Not Available
Vendor-Dell Inc.
Product-openmanage_server_administratorDell Open Manage Server Administrator
CWE ID-CWE-287
Improper Authentication
CVE-2019-16327
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.18% / 39.87%
||
7 Day CHG~0.00%
Published-26 Dec, 2019 | 17:28
Updated-05 Aug, 2024 | 01:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

D-Link DIR-601 B1 2.00NA devices are vulnerable to authentication bypass. They do not check for authentication at the server side and rely on client-side validation, which is bypassable. NOTE: this is an end-of-life product.

Action-Not Available
Vendor-n/aD-Link Corporation
Product-dir-601_firmwaredir-601n/a
CWE ID-CWE-287
Improper Authentication
CVE-2024-12264
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-9.8||CRITICAL
EPSS-0.12% / 31.00%
||
7 Day CHG~0.00%
Published-07 Jan, 2025 | 04:22
Updated-07 Jan, 2025 | 16:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
PayU CommercePro Plugin <= 3.8.3 - Unauthenticated Privilege Escalation

The PayU CommercePro Plugin plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 3.8.3. This is due to /wp-json/payu/v1/generate-user-token and /wp-json/payu/v1/get-shipping-cost REST API endpoints not properly verifying a user's identity prior to setting the users ID and auth cookies. This makes it possible for unauthenticated attackers to create new administrative user accounts.

Action-Not Available
Vendor-payuplugin
Product-PayU CommercePro Plugin
CWE ID-CWE-287
Improper Authentication
CVE-2021-21564
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-9.8||CRITICAL
EPSS-0.80% / 73.07%
||
7 Day CHG~0.00%
Published-09 Aug, 2021 | 21:05
Updated-17 Sep, 2024 | 03:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell OpenManage Enterprise versions prior to 3.6.1 contain an improper authentication vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability to hijack an elevated session or perform unauthorized actions by sending malformed data.

Action-Not Available
Vendor-Dell Inc.
Product-openmanage_enterpriseDell OpenManage Enterprise
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-287
Improper Authentication
CVE-2024-12287
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-9.8||CRITICAL
EPSS-0.52% / 65.86%
||
7 Day CHG+0.08%
Published-18 Dec, 2024 | 07:02
Updated-18 Dec, 2024 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Biagiotti Membership <= 1.0.2 - Authentication Bypass via biagiotti_membership_check_facebook_user

The Biagiotti Membership plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.0.2. This is due to the plugin not properly verifying a user's identity prior to authenticating them. This makes it possible for unauthenticated attackers to log in as other users, such as administrators, granted they have access to an email.

Action-Not Available
Vendor-Mikado-Themes
Product-Biagiotti Membership
CWE ID-CWE-287
Improper Authentication
CVE-2024-1147
Matching Score-4
Assigner-OpenText (formerly Micro Focus)
ShareView Details
Matching Score-4
Assigner-OpenText (formerly Micro Focus)
CVSS Score-9.8||CRITICAL
EPSS-0.09% / 26.84%
||
7 Day CHG~0.00%
Published-21 Mar, 2024 | 07:33
Updated-11 Nov, 2024 | 20:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Weak Access Control - Arbitrary file download

Weak access control in OpenText PVCS Version Manager allows potential bypassing of authentication and download of files.

Action-Not Available
Vendor-Open Text Corporation
Product-PVCS Version Managerpvcs_version_manager
CWE ID-CWE-287
Improper Authentication
CVE-2024-11680
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-9.8||CRITICAL
EPSS-93.61% / 99.83%
||
7 Day CHG~0.00%
Published-26 Nov, 2024 | 09:55
Updated-30 Jul, 2025 | 01:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2024-12-24||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
ProjectSend Unauthenticated Configuration Modification

ProjectSend versions prior to r1720 are affected by an improper authentication vulnerability. Remote, unauthenticated attackers can exploit this flaw by sending crafted HTTP requests to options.php, enabling unauthorized modification of the application's configuration. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript.

Action-Not Available
Vendor-projectsendProjectSendprojectsendProjectSend
Product-projectsendProjectSendprojectsendProjectSend
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-11209
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.17% / 39.08%
||
7 Day CHG~0.00%
Published-14 Nov, 2024 | 13:31
Updated-19 Nov, 2024 | 19:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apereo CAS 2FA login improper authentication

A vulnerability was found in Apereo CAS 6.6. It has been classified as critical. This affects an unknown part of the file /login?service of the component 2FA. The manipulation leads to improper authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-apereoApereoapereo
Product-central_authentication_serviceCAScas_server
CWE ID-CWE-287
Improper Authentication
CVE-2024-11087
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-8.1||HIGH
EPSS-0.34% / 55.84%
||
7 Day CHG~0.00%
Published-08 Mar, 2025 | 07:04
Updated-13 Mar, 2025 | 13:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
miniOrange Social Login and Register (Discord, Google, Twitter, LinkedIn) Pro Addon <= 200.3.9 - Authentication Bypass

The miniOrange Social Login and Register (Discord, Google, Twitter, LinkedIn) Pro Addon plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 200.3.9. This is due to insufficient verification on the user being returned by the social login token. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username and the user does not have an already-existing account for the service returning the token.

Action-Not Available
Vendor-miniorangecyberlord92
Product-social_loginminiOrange Social Login and Register (Discord, Google, Twitter, LinkedIn) Pro Addon
CWE ID-CWE-287
Improper Authentication
CVE-2021-21403
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-0.18% / 40.37%
||
7 Day CHG~0.00%
Published-26 Mar, 2021 | 17:15
Updated-03 Aug, 2024 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authentication Bypass by Primary Weakness in github.com/kongchuanhujiao/server

In github.com/kongchuanhujiao/server before version 1.3.21 there is an authentication Bypass by Primary Weakness vulnerability. All users are impacted. This is fixed in version 1.3.21.

Action-Not Available
Vendor-kongchuanhujiao_projectkongchuanhujiao
Product-kongchuanhujiaoserver
CWE ID-CWE-305
Authentication Bypass by Primary Weakness
CWE ID-CWE-287
Improper Authentication
CVE-2010-0447
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-10||HIGH
EPSS-6.20% / 90.49%
||
7 Day CHG~0.00%
Published-10 Mar, 2010 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The helpmanager servlet in the web server in HP OpenView Performance Insight (OVPI) 5.4 and earlier does not properly authenticate and validate requests, which allows remote attackers to execute arbitrary commands via vectors involving upload of a JSP document.

Action-Not Available
Vendor-n/aHP Inc.
Product-openview_performance_insightn/a
CWE ID-CWE-287
Improper Authentication
CVE-2014-5081
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-6.28% / 90.55%
||
7 Day CHG~0.00%
Published-10 Jan, 2020 | 12:29
Updated-06 Aug, 2024 | 11:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

sphider prior to 1.3.6, sphider-pro prior to 3.2, and sphider-plus prior to 3.2 allow authentication bypass

Action-Not Available
Vendor-sphiderprosphider-plussphidern/a
Product-sphidersphider-plussphider_pron/a
CWE ID-CWE-287
Improper Authentication
CVE-2018-17777
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.47% / 63.56%
||
7 Day CHG~0.00%
Published-18 Dec, 2018 | 22:00
Updated-05 Aug, 2024 | 10:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on D-Link DVA-5592 A1_WI_20180823 devices. If the PIN of the page "/ui/cbpc/login" is the default Parental Control PIN (0000), it is possible to bypass the login form by editing the path of the cookie "sid" generated by the page. The attacker will have access to the router control panel with administrator privileges.

Action-Not Available
Vendor-n/aD-Link Corporation
Product-dva-5592dva-5592_firmwaren/a
CWE ID-CWE-287
Improper Authentication
CVE-2024-11015
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-9.8||CRITICAL
EPSS-0.52% / 65.99%
||
7 Day CHG~0.00%
Published-12 Dec, 2024 | 03:23
Updated-12 Dec, 2024 | 16:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Sign In With Google <= 1.8.0 - Authentication Bypass in authenticate_user

The Sign In With Google plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.8.0. This is due to the 'authenticate_user' user function not implementing sufficient null value checks when setting the access token and user information. This makes it possible for unauthenticated attackers to log in as the first user who has signed in using Google OAuth, which could be the site administrator.

Action-Not Available
Vendor-tarecord
Product-Sign In With Google
CWE ID-CWE-287
Improper Authentication
CVE-2024-0799
Matching Score-4
Assigner-Tenable Network Security, Inc.
ShareView Details
Matching Score-4
Assigner-Tenable Network Security, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.07% / 20.98%
||
7 Day CHG~0.00%
Published-13 Mar, 2024 | 18:57
Updated-01 Aug, 2024 | 18:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authentication Bypass via wizardLogin in Arcserve Unified Data Protection

An authentication bypass vulnerability exists in Arcserve Unified Data Protection 9.2 and 8.1 in the edge-app-base-webui.jar!com.ca.arcserve.edge.app.base.ui.server.EdgeLoginServiceImpl.doLogin() function within wizardLogin.

Action-Not Available
Vendor-Arcserve, LLC
Product-Unified Data Protectionarcserve_unified_data_protection
CWE ID-CWE-287
Improper Authentication
CVE-2018-17153
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-91.65% / 99.67%
||
7 Day CHG~0.00%
Published-18 Sep, 2018 | 00:00
Updated-05 Aug, 2024 | 10:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

It was discovered that the Western Digital My Cloud device before 2.30.196 is affected by an authentication bypass vulnerability. An unauthenticated attacker can exploit this vulnerability to authenticate as an admin user without needing to provide a password, thereby gaining full control of the device. (Whenever an admin logs into My Cloud, a server-side session is created that is bound to the user's IP address. After the session is created, it is possible to call authenticated CGI modules by sending the cookie username=admin in the HTTP request. The invoked CGI will check if a valid session is present and bound to the user's IP address.) It was found that it is possible for an unauthenticated attacker to create a valid session without a login. The network_mgr.cgi CGI module contains a command called "cgi_get_ipv6" that starts an admin session -- tied to the IP address of the user making the request -- if the additional parameter "flag" with the value "1" is provided. Subsequent invocation of commands that would normally require admin privileges now succeed if an attacker sets the username=admin cookie.

Action-Not Available
Vendor-n/aWestern Digital Corp.
Product-my_cloud_mirror_gen_2_firmwaremy_cloud_wdbctl0020hwtmy_cloud_ex4my_cloud_ex2my_cloud_pr4100my_cloud_mirror_firmwaremy_cloud_ex4_firmwaremy_cloud_dl2100my_cloud_pr2100my_cloud_ex4100my_cloud_ex2_ultramy_cloud_mirror_gen_2my_cloud_mirrormy_cloud_ex2100my_cloud_dl4100my_cloud_wdbctl0020hwt_firmwaremy_cloud_ex2100_firmwaremy_cloud_dl4100_firmwaremy_cloud_pr2100_firmwaremy_cloud_ex2_firmwaremy_cloud_ex2_ultra_firmwaren/a
CWE ID-CWE-287
Improper Authentication
CVE-2024-0988
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.3||MEDIUM
EPSS-0.17% / 38.41%
||
7 Day CHG~0.00%
Published-29 Jan, 2024 | 00:00
Updated-12 Sep, 2024 | 18:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Sichuan Yougou Technology KuERP common.php checklogin improper authentication

A vulnerability classified as critical was found in Sichuan Yougou Technology KuERP up to 1.0.4. Affected by this vulnerability is the function checklogin of the file /application/index/common.php. The manipulation of the argument App_User_id/App_user_Token leads to improper authentication. The exploit has been disclosed to the public and may be used. The identifier VDB-252253 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-kuerp_projectSichuan Yougou Technology
Product-kuerpKuERP
CWE ID-CWE-287
Improper Authentication
CVE-2021-20776
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.38% / 58.83%
||
7 Day CHG~0.00%
Published-07 Jul, 2021 | 07:05
Updated-03 Aug, 2024 | 17:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authentication vulnerability in SCT-40CM01SR and AT-40CM01SR allows an attacker to bypass access restriction and execute an arbitrary command via telnet.

Action-Not Available
Vendor-A-Stage Inc.
Product-sct-40cm01srat-40cm01srat-40cm01sr_firmwaresct-40cm01sr_firmwareSCT-40CM01SR and AT-40CM01SR
CWE ID-CWE-287
Improper Authentication
CVE-2009-3421
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-3.03% / 86.13%
||
7 Day CHG~0.00%
Published-25 Sep, 2009 | 22:00
Updated-07 Aug, 2024 | 06:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

login.php in Zenas PaoBacheca Guestbook 2.1, when register_globals is enabled, allows remote attackers to bypass authentication and gain administrative access by setting the login_ok parameter to 1.

Action-Not Available
Vendor-zenasn/a
Product-pao-bacheca_guestbookn/a
CWE ID-CWE-287
Improper Authentication
CVE-2009-3027
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-43.91% / 97.45%
||
7 Day CHG~0.00%
Published-11 Dec, 2009 | 16:00
Updated-07 Aug, 2024 | 06:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VRTSweb.exe in VRTSweb in Symantec Backup Exec Continuous Protection Server (CPS) 11d, 12.0, and 12.5; Veritas NetBackup Operations Manager (NOM) 6.0 GA through 6.5.5; Veritas Backup Reporter (VBR) 6.0 GA through 6.6; Veritas Storage Foundation (SF) 3.5; Veritas Storage Foundation for Windows High Availability (SFWHA) 4.3MP2, 5.0, 5.0RP1a, 5.0RP2, 5.1, and 5.1AP1; Veritas Storage Foundation for High Availability (SFHA) 3.5; Veritas Storage Foundation for Oracle (SFO) 4.1, 5.0, and 5.0.1; Veritas Storage Foundation for DB2 4.1 and 5.0; Veritas Storage Foundation for Sybase 4.1 and 5.0; Veritas Storage Foundation for Oracle Real Application Cluster (SFRAC) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Manager (SFM) 1.0, 1.0 MP1, 1.1, 1.1.1Ux, 1.1.1Win, and 2.0; Veritas Cluster Server (VCS) 3.5, 4.0, 4.1, and 5.0; Veritas Cluster Server One (VCSOne) 2.0, 2.0.1, and 2.0.2; Veritas Application Director (VAD) 1.1 and 1.1 Platform Expansion; Veritas Cluster Server Management Console (VCSMC) 5.1, 5.5, and 5.5.1; Veritas Storage Foundation Cluster File System (SFCFS) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Cluster File System for Oracle RAC (SFCFS RAC) 5.0; Veritas Command Central Storage (CCS) 4.x, 5.0, and 5.1; Veritas Command Central Enterprise Reporter (CC-ER) 5.0 GA, 5.0 MP1, 5.0 MP1RP1, and 5.1; Veritas Command Central Storage Change Manager (CC-SCM) 5.0 and 5.1; and Veritas MicroMeasure 5.0 does not properly validate authentication requests, which allows remote attackers to trigger the unpacking of a WAR archive, and execute arbitrary code in the contained files, via crafted data to TCP port 14300.

Action-Not Available
Vendor-n/aSymantec Corporation
Product-backup_exec_continuous_protection_serververitas_storage_foundation_for_sybaseveritas_netbackup_reporterveritas_storage_foundation_for_oracleveritas_micromeasureveritas_storae_foundationveritas_cluster_serververitas_storage_foundation_for_windows_high_availabilityveritas_command_central_storage_change_managerveritas_backup_execveritas_cluster_server_oneveritas_storage_foundationveritas_command_central_storageveritas_cluster_server_management_consoleveritas_application_directorveritas_command_central_enterprise_reporterveritas_storage_foundation_for_db2veritas_storage_foundation_cluster_file_system_for_oracle_racveritas_netbackup_operations_managerveritas_storage_foundation_managerveritas_storage_foundation_for_oracle_real_application_clusterveritas_storage_foundation_cluster_file_systemveritas_storage_foundation_for_high_availabilityn/a
CWE ID-CWE-287
Improper Authentication
CVE-2022-34379
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-9.4||CRITICAL
EPSS-0.19% / 40.99%
||
7 Day CHG~0.00%
Published-01 Sep, 2022 | 18:45
Updated-16 Sep, 2024 | 16:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell EMC CloudLink 7.1.2 and all prior versions contain an Authentication Bypass Vulnerability. A remote attacker, with the knowledge of the active directory usernames, could potentially exploit this vulnerability to gain unauthorized access to the system.

Action-Not Available
Vendor-Dell Inc.
Product-cloudlinkCloudLink
CWE ID-CWE-287
Improper Authentication
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 16
  • 17
  • Next
Details not found