ID

VAR-201407-0012


CVE

CVE-2013-6117


TITLE

Dahua DVR Vulnerabilities that bypass authentication

Trust: 0.8

sources: JVNDB: JVNDB-2013-006612

DESCRIPTION

Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777. Dahua Security DVR Appliances is a digital video device developed by Dahua Technologies. Dahua Security DVR Appliances utilize thin clients such as PSS, mobile client interfaces such as iDMSS and the ActiveX control \"webrec.cab\" for access. These clients communicate with the management service (TCP 37777). An attacker can exploit this issue to bypass the authentication mechanism and perform unauthorized actions. This may aid in further attacks. Dahua DVR is a hard disk video recorder product of Dahua Company in China

Trust: 2.61

sources: NVD: CVE-2013-6117 // JVNDB: JVNDB-2013-006612 // CNVD: CNVD-2013-14541 // BID: 63742 // VULHUB: VHN-66119 // VULMON: CVE-2013-6117

IOT TAXONOMY

category:['IoT', 'Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2013-14541

AFFECTED PRODUCTS

vendor:dahuasecuritymodel:dvrscope:eqversion:2.608.gv00.0

Trust: 1.6

vendor:dahuasecuritymodel:dvrscope:eqversion:2.608.0000.0

Trust: 1.6

vendor:dahuamodel:dvrscope:eqversion:2.608.0000.0

Trust: 0.8

vendor:dahuamodel:dvrscope:eqversion:2.608.gv00.0

Trust: 0.8

vendor:dahuamodel:security dvr appliancesscope:eqversion:2.608.0000.0

Trust: 0.6

vendor:dahuamodel:security dvr appliances 2.608.gv00.0scope: - version: -

Trust: 0.6

vendor: - model:dahua technology dvr appliances 2.608.gv00.0scope: - version: -

Trust: 0.3

vendor: - model:dahua technology dvr appliancesscope:eqversion:2.608.0000.0

Trust: 0.3

sources: CNVD: CNVD-2013-14541 // BID: 63742 // JVNDB: JVNDB-2013-006612 // CNNVD: CNNVD-201311-262 // NVD: CVE-2013-6117

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-6117
value: HIGH

Trust: 1.0

NVD: CVE-2013-6117
value: HIGH

Trust: 0.8

CNVD: CNVD-2013-14541
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201311-262
value: HIGH

Trust: 0.6

VULHUB: VHN-66119
value: HIGH

Trust: 0.1

VULMON: CVE-2013-6117
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-6117
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2013-14541
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-66119
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2013-14541 // VULHUB: VHN-66119 // VULMON: CVE-2013-6117 // JVNDB: JVNDB-2013-006612 // CNNVD: CNNVD-201311-262 // NVD: CVE-2013-6117

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.9

sources: VULHUB: VHN-66119 // JVNDB: JVNDB-2013-006612 // NVD: CVE-2013-6117

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201311-262

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-201311-262

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-006612

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-66119 // VULMON: CVE-2013-6117

PATCH

title:Top Pageurl:http://www.dahuasecurity.com/

Trust: 0.8

title:CVE-2013-6117url:https://github.com/milo2012/CVE-2013-6117

Trust: 0.1

title:Malwareurl:https://github.com/nsslabcuus/Malware

Trust: 0.1

title: - url:https://github.com/JERRY123S/all-poc

Trust: 0.1

title:BleepingComputerurl:https://www.bleepingcomputer.com/news/security/passwords-for-tens-of-thousands-of-dahua-devices-cached-in-iot-search-engine/

Trust: 0.1

sources: VULMON: CVE-2013-6117 // JVNDB: JVNDB-2013-006612

EXTERNAL IDS

db:NVDid:CVE-2013-6117

Trust: 3.5

db:OSVDBid:99783

Trust: 2.6

db:PACKETSTORMid:124022

Trust: 1.8

db:EXPLOIT-DBid:29673

Trust: 1.8

db:BIDid:63742

Trust: 1.7

db:JVNDBid:JVNDB-2013-006612

Trust: 0.8

db:CNNVDid:CNNVD-201311-262

Trust: 0.7

db:CNVDid:CNVD-2013-14541

Trust: 0.6

db:VULHUBid:VHN-66119

Trust: 0.1

db:VULMONid:CVE-2013-6117

Trust: 0.1

sources: CNVD: CNVD-2013-14541 // VULHUB: VHN-66119 // VULMON: CVE-2013-6117 // BID: 63742 // JVNDB: JVNDB-2013-006612 // CNNVD: CNNVD-201311-262 // NVD: CVE-2013-6117

REFERENCES

url:http://blog.depthsecurity.com/2013/11/dahua-dvr-authentication-bypass-cve.html

Trust: 2.9

url:http://www.osvdb.org/99783

Trust: 2.6

url:http://seclists.org/bugtraq/2013/nov/62

Trust: 2.1

url:http://www.exploit-db.com/exploits/29673

Trust: 1.8

url:http://packetstormsecurity.com/files/124022/dahua-dvr-authentication-bypass.html

Trust: 1.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-6117

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-6117

Trust: 0.8

url:http://www.securityfocus.com/bid/63742

Trust: 0.7

url:http://www.securityfocus.com/archive/1/529799

Trust: 0.6

url:http://www.dahuasecurity.com/products_category/dvr-2.html

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/287.html

Trust: 0.1

url:https://github.com/milo2012/cve-2013-6117

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.exploit-db.com/exploits/29673/

Trust: 0.1

sources: CNVD: CNVD-2013-14541 // VULHUB: VHN-66119 // VULMON: CVE-2013-6117 // BID: 63742 // JVNDB: JVNDB-2013-006612 // CNNVD: CNNVD-201311-262 // NVD: CVE-2013-6117

CREDITS

Jake Reynolds

Trust: 0.9

sources: BID: 63742 // CNNVD: CNNVD-201311-262

SOURCES

db:CNVDid:CNVD-2013-14541
db:VULHUBid:VHN-66119
db:VULMONid:CVE-2013-6117
db:BIDid:63742
db:JVNDBid:JVNDB-2013-006612
db:CNNVDid:CNNVD-201311-262
db:NVDid:CVE-2013-6117

LAST UPDATE DATE

2024-11-23T23:02:48.496000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-14541date:2013-11-20T00:00:00
db:VULHUBid:VHN-66119date:2014-07-14T00:00:00
db:VULMONid:CVE-2013-6117date:2014-07-14T00:00:00
db:BIDid:63742date:2013-11-13T00:00:00
db:JVNDBid:JVNDB-2013-006612date:2014-07-15T00:00:00
db:CNNVDid:CNNVD-201311-262date:2017-05-08T00:00:00
db:NVDid:CVE-2013-6117date:2024-11-21T01:58:43.807

SOURCES RELEASE DATE

db:CNVDid:CNVD-2013-14541date:2013-11-19T00:00:00
db:VULHUBid:VHN-66119date:2014-07-11T00:00:00
db:VULMONid:CVE-2013-6117date:2014-07-11T00:00:00
db:BIDid:63742date:2013-11-13T00:00:00
db:JVNDBid:JVNDB-2013-006612date:2014-07-15T00:00:00
db:CNNVDid:CNNVD-201311-262date:2013-11-21T00:00:00
db:NVDid:CVE-2013-6117date:2014-07-11T19:55:02.673