Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

N/A

BOS ID

-
N/A

Tags

-
N/A

Related Bos

-
N/A

Note

-
N/A
Mapped CVEsMapped VendorsRelated AssignersReports
0Vulnerabilities found

CVE-2017-7925
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-77.23% / 98.93%
||
7 Day CHG~0.00%
Published-06 May, 2017 | 00:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Password in Configuration File issue was discovered in Dahua DH-IPC-HDBW23A0RN-ZS, DH-IPC-HDBW13A0SN, DH-IPC-HDW1XXX, DH-IPC-HDW2XXX, DH-IPC-HDW4XXX, DH-IPC-HFW1XXX, DH-IPC-HFW2XXX, DH-IPC-HFW4XXX, DH-SD6CXX, DH-NVR1XXX, DH-HCVR4XXX, DH-HCVR5XXX, DHI-HCVR51A04HE-S3, DHI-HCVR51A08HE-S3, and DHI-HCVR58A32S-S2 devices. The password in configuration file vulnerability was identified, which could lead to a malicious user assuming the identity of a privileged user and gaining access to sensitive information.

Action-Not Available
Vendor-n/aDahua Technology Co., Ltd
Product-dhi-hcvr51a04he-s3_firmwaredh-ipc-hdw2xxxdh-ipc-hdw1xxxdh-hcvr5xxx_firmwaredh-ipc-hfw4xxxddh-hcvr4xxxdh-hcvr4xxx_firmwaredh-sd6cxx_firmwaredh-nvr1xxx_firmwaredh-ipc-hdbw13a0sndhi-hcvr51a08he-s3_firmwaredhi-hcvr51a08he-s3dh-ipc-hdbw23a0rn-zsdh-ipc-hfw1xxx_firmwaredhi-hcvr51a04he-s3dh-hcvr5xxxdh-sd6cxxdh-ipc-hdw4xxx_firmwaredh-ipc-hfw2xxxdh-ipc-hdw1xxx_firmwaredh-ipc-hdw4xxxdh-nvr1xxxdh-ipc-hdbw23a0rn-zs_firmwaredh-ipc-hfw4xxx_firmwaredh-ipc-hdbw13a0sn_firmwaredh-ipc-hfw1xxxdhi-hcvr58a32s-s2dh-ipc-hfw2xxx_firmwaredhi-hcvr58a32s-s2_firmwaredh-ipc-hdw2xxx_firmwareDahua Technology Co., Ltd Digital Video Recorders and IP Cameras
CWE ID-CWE-260
Password in Configuration File
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2017-7253
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-0.99% / 75.90%
||
7 Day CHG~0.00%
Published-30 Mar, 2017 | 18:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dahua IP Camera devices 3.200.0001.6 can be exploited via these steps: 1. Use the default low-privilege credentials to list all users via a request to a certain URI. 2. Login to the IP camera with admin credentials so as to obtain full control of the target IP camera. During exploitation, the first JSON object encountered has a "Component error: login challenge!" message. The second JSON object encountered has a result indicating a successful admin login.

Action-Not Available
Vendor-n/aDahua Technology Co., Ltd
Product-ip_camera_firmwareip_cameran/a
CWE ID-CWE-922
Insecure Storage of Sensitive Information
CVE-2017-6432
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-0.17% / 38.42%
||
7 Day CHG~0.00%
Published-09 Mar, 2017 | 17:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Dahua DHI-HCVR7216A-S3 3.210.0001.10 build 2016-06-06 devices. The Dahua DVR Protocol, which operates on TCP Port 37777, is an unencrypted, binary protocol. Performing a Man-in-the-Middle attack allows both sniffing and injections of packets, which allows creation of fully privileged new users, in addition to capture of sensitive information.

Action-Not Available
Vendor-n/aDahua Technology Co., Ltd
Product-nvr_firmwaredhi-hcvr7216a-s3n/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2017-6343
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-2.35% / 84.27%
||
7 Day CHG~0.00%
Published-27 Feb, 2017 | 07:25
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The web interface on Dahua DHI-HCVR7216A-S3 devices with NVR Firmware 3.210.0001.10 2016-06-06, Camera Firmware 2.400.0000.28.R 2016-03-29, and SmartPSS Software 1.16.1 2017-01-19 allows remote attackers to obtain login access by leveraging knowledge of the MD5 Admin Hash without knowledge of the corresponding password, a different vulnerability than CVE-2013-6117.

Action-Not Available
Vendor-n/aDahua Technology Co., Ltd
Product-nvr_firmwaresmartpss_firmwarecamera_firmwaredhi-hcvr7216a-s3n/a
CWE ID-CWE-287
Improper Authentication
CVE-2017-6342
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.35% / 56.89%
||
7 Day CHG~0.00%
Published-27 Feb, 2017 | 07:25
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Dahua DHI-HCVR7216A-S3 devices with NVR Firmware 3.210.0001.10 2016-06-06, Camera Firmware 2.400.0000.28.R 2016-03-29, and SmartPSS Software 1.16.1 2017-01-19. When SmartPSS Software is launched, while on the login screen, the software in the background automatically logs in as admin. This allows sniffing sensitive information identified in CVE-2017-6341 without prior knowledge of the password. This is a different vulnerability than CVE-2013-6117.

Action-Not Available
Vendor-n/aDahua Technology Co., Ltd
Product-nvr_firmwaresmartpss_firmwarecamera_firmwaredhi-hcvr7216a-s3n/a
CWE ID-CWE-269
Improper Privilege Management
CVE-2017-6341
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.48% / 63.88%
||
7 Day CHG~0.00%
Published-27 Feb, 2017 | 07:25
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dahua DHI-HCVR7216A-S3 devices with NVR Firmware 3.210.0001.10 2016-06-06, Camera Firmware 2.400.0000.28.R 2016-03-29, and SmartPSS Software 1.16.1 2017-01-19 send cleartext passwords in response to requests from the Web Page, Mobile Application, and Desktop Application interfaces, which allows remote attackers to obtain sensitive information by sniffing the network, a different vulnerability than CVE-2013-6117.

Action-Not Available
Vendor-n/aDahua Technology Co., Ltd
Product-nvr_firmwaresmartpss_firmwarecamera_firmwaredhi-hcvr7216a-s3n/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2013-6117
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-89.20% / 99.52%
||
7 Day CHG~0.00%
Published-11 Jul, 2014 | 19:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

Action-Not Available
Vendor-n/aDahua Technology Co., Ltd
Product-dvr_firmwaren/a
CWE ID-CWE-287
Improper Authentication
CVE-2013-3613
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-7.8||HIGH
EPSS-11.44% / 93.32%
||
7 Day CHG~0.00%
Published-17 Sep, 2013 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dahua DVR appliances do not properly restrict UPnP requests, which makes it easier for remote attackers to obtain access via vectors involving a replay attack against the TELNET port.

Action-Not Available
Vendor-n/aDahua Technology Co., Ltd
Product-dvr3224ldvr5108hedvr0404hd-sdvr1604hf-u-edvr2404hf-sdvr5104hedvr2108hdvr2404lf-aldvr2108cdvr2104hedvr6404lf-sdvr5104cdvr0404hf-u-edvr5416dvr1604hf-a-edvr5216advr5204ldvr0404hf-s-edvr5108hdvr5408dvr0804hd-sdvr0404hd-ldvr2108hcdvr5116cdvr5804dvr5204advr2104hdvr0804hd-ldvr5208advr1604hf-al-edvr1604hd-ldvr5116hedvr0404hf-a-edvr1604hf-s-edvr5808dvr1604hd-sdvr0804hf-l-edvr0404hd-advr5208ldvr2104cdvr3232ldvr3204lf-aldvr0804hf-u-edvr1604hf-l-edvr2108hedvr0804dvr2116hcdvr3204hf-sdvr5216ldvr0804hf-al-edvr2404lf-sdvr3204lf-sdvr0404hd-udvr5404dvr5816dvr5108cdvr2116hdvr2116cdvr5116hdvr0804hf-s-edvr0404hf-al-edvr0804hf-a-edvr2116hedvr2104hcdvr5104hn/a
CWE ID-CWE-287
Improper Authentication
CVE-2013-5754
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-1.37% / 79.43%
||
7 Day CHG~0.00%
Published-17 Sep, 2013 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The authorization implementation on Dahua DVR appliances accepts a hash string representing the current date for the role of a master password, which makes it easier for remote attackers to obtain administrative access and change the administrator password via requests involving (1) ActiveX, (2) a standalone client, or (3) unspecified other vectors, a different vulnerability than CVE-2013-3612.

Action-Not Available
Vendor-n/aDahua Technology Co., Ltd
Product-dvr3224ldvr5108hedvr0404hd-sdvr1604hf-u-edvr2404hf-sdvr5104hedvr2108hdvr2404lf-aldvr2108cdvr2104hedvr6404lf-sdvr5104cdvr0404hf-u-edvr5416dvr1604hf-a-edvr5216advr5204ldvr0404hf-s-edvr5108hdvr5408dvr0804hd-sdvr0404hd-ldvr2108hcdvr5116cdvr5804dvr5204advr2104hdvr0804hd-ldvr5208advr1604hf-al-edvr1604hd-ldvr5116hedvr0404hf-a-edvr1604hf-s-edvr5808dvr1604hd-sdvr0804hf-l-edvr0404hd-advr5208ldvr2104cdvr3232ldvr3204lf-aldvr0804hf-u-edvr1604hf-l-edvr2108hedvr0804dvr2116hcdvr3204hf-sdvr5216ldvr0804hf-al-edvr2404lf-sdvr3204lf-sdvr0404hd-udvr5404dvr5816dvr5108cdvr2116hdvr2116cdvr5116hdvr0804hf-s-edvr0404hf-al-edvr0804hf-a-edvr2116hedvr2104hcdvr5104hn/a
CVE-2013-3615
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-7.8||HIGH
EPSS-7.92% / 91.67%
||
7 Day CHG~0.00%
Published-17 Sep, 2013 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dahua DVR appliances use a password-hash algorithm with a short hash length, which makes it easier for context-dependent attackers to discover cleartext passwords via a brute-force attack.

Action-Not Available
Vendor-n/aDahua Technology Co., Ltd
Product-dvr3224ldvr5108hedvr0404hd-sdvr1604hf-u-edvr2404hf-sdvr5104hedvr2108hdvr2404lf-aldvr2108cdvr2104hedvr6404lf-sdvr5104cdvr0404hf-u-edvr5416dvr1604hf-a-edvr5216advr5204ldvr0404hf-s-edvr5108hdvr5408dvr0804hd-sdvr0404hd-ldvr2108hcdvr5116cdvr5804dvr5204advr2104hdvr0804hd-ldvr5208advr1604hf-al-edvr1604hd-ldvr5116hedvr0404hf-a-edvr1604hf-s-edvr5808dvr1604hd-sdvr0804hf-l-edvr0404hd-advr5208ldvr2104cdvr3232ldvr3204lf-aldvr0804hf-u-edvr1604hf-l-edvr2108hedvr0804dvr2116hcdvr3204hf-sdvr5216ldvr0804hf-al-edvr2404lf-sdvr3204lf-sdvr0404hd-udvr5404dvr5816dvr5108cdvr2116hdvr2116cdvr5116hdvr0804hf-s-edvr0404hf-al-edvr0804hf-a-edvr2116hedvr2104hcdvr5104hn/a
CVE-2013-3614
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-9.3||HIGH
EPSS-13.62% / 93.98%
||
7 Day CHG~0.00%
Published-17 Sep, 2013 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dahua DVR appliances have a small value for the maximum password length, which makes it easier for remote attackers to obtain access via a brute-force attack.

Action-Not Available
Vendor-n/aDahua Technology Co., Ltd
Product-dvr3224ldvr5108hedvr0404hd-sdvr1604hf-u-edvr2404hf-sdvr5104hedvr2108hdvr2404lf-aldvr2108cdvr2104hedvr6404lf-sdvr5104cdvr0404hf-u-edvr5416dvr1604hf-a-edvr5216advr5204ldvr0404hf-s-edvr5108hdvr5408dvr0804hd-sdvr0404hd-ldvr2108hcdvr5116cdvr5804dvr5204advr2104hdvr0804hd-ldvr5208advr1604hf-al-edvr1604hd-ldvr5116hedvr0404hf-a-edvr1604hf-s-edvr5808dvr1604hd-sdvr0804hf-l-edvr0404hd-advr5208ldvr2104cdvr3232ldvr3204lf-aldvr0804hf-u-edvr1604hf-l-edvr2108hedvr0804dvr2116hcdvr3204hf-sdvr5216ldvr0804hf-al-edvr2404lf-sdvr3204lf-sdvr0404hd-udvr5404dvr5816dvr5108cdvr2116hdvr2116cdvr5116hdvr0804hf-s-edvr0404hf-al-edvr0804hf-a-edvr2116hedvr2104hcdvr5104hn/a
CVE-2013-3612
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-10||HIGH
EPSS-14.69% / 94.22%
||
7 Day CHG~0.00%
Published-17 Sep, 2013 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dahua DVR appliances have a hardcoded password for (1) the root account and (2) an unspecified "backdoor" account, which makes it easier for remote attackers to obtain administrative access via authorization requests involving (a) ActiveX, (b) a standalone client, or (c) unknown other vectors.

Action-Not Available
Vendor-n/aDahua Technology Co., Ltd
Product-dvr3224ldvr5108hedvr0404hd-sdvr1604hf-u-edvr2404hf-sdvr5104hedvr2108hdvr2404lf-aldvr2108cdvr2104hedvr6404lf-sdvr5104cdvr0404hf-u-edvr5416dvr1604hf-a-edvr5216advr5204ldvr0404hf-s-edvr5108hdvr5408dvr0804hd-sdvr0404hd-ldvr2108hcdvr5116cdvr5804dvr5204advr2104hdvr0804hd-ldvr5208advr1604hf-al-edvr1604hd-ldvr5116hedvr0404hf-a-edvr1604hf-s-edvr5808dvr1604hd-sdvr0804hf-l-edvr0404hd-advr5208ldvr2104cdvr3232ldvr3204lf-aldvr0804hf-u-edvr1604hf-l-edvr2108hedvr0804dvr2116hcdvr3204hf-sdvr5216ldvr0804hf-al-edvr2404lf-sdvr3204lf-sdvr0404hd-udvr5404dvr5816dvr5108cdvr2116hdvr2116cdvr5116hdvr0804hf-s-edvr0404hf-al-edvr0804hf-a-edvr2116hedvr2104hcdvr5104hn/a