ID

VAR-201711-1047


CVE

CVE-2017-9315


TITLE

Dahua IP Camera and IP PTZ Cryptographic vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-011143

DESCRIPTION

Customer of Dahua IP camera or IP PTZ could submit relevant device information to receive a time limited temporary password from Dahua authorized dealer to reset the admin password. The algorithm used in this mechanism is potentially at risk of being compromised and subsequently utilized by attacker. Dahua IP Camera and IP PTZ Contains a cryptographic vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Dahua Technology IP Camera. Authentication is not required to exploit this vulnerability.The specific flaw exists within the disaster recovery password functionality. If the device uses its default settings, the password generation algorithm produces a predictable result. An attacker can leverage this vulnerability to gain control of the device under attack. Dahua IPC-HFW and others are network camera equipment of Dahua Company of China. There are security vulnerabilities in several Dahua products. An attacker could use this vulnerability to reset the administrator password. Dahua IPC-HFW, etc. The following products are affected: Dahua IPC-HFW1XXX Build 2015/07 to 2017/03; IPC-HDW1XXX Build 2015/07 to 2017/03; IPC-HDBW1XXX Build 2015/07 to 2017/03; IPC- HFW2XXX Build 2015/07 to 2017/03; IPC-HDW2XXX Build 2015/07 to 2017/03; IPC-HDBW2XXX Build 2015/07 to 2017/03; IPC-HFW4XXX Build 2015/07 to 2017 /03 version; IPC-HDW4XXX Build 2015/07 to 2017/03 version; IPC-HDBW4XXX Build 2015/07 to 2017/03 version; IPC-HF5XXX Build 2015/07 to 2017/03 version; IPC-HFW5XXX Build 2015/07 to 2017/03; IPC-HDW5XXX Build 2015/07 to 2017/03; IPC-HDBW5XXX Build 2015/07 to 2017/03; IPC-HF8XXX Build 2015/07 to 2017/03 Version; IPC-HFW8XXX Build 2015/07 to 2017/03; IPC-HDBW8XXX Build 2015/07 to 2017/03; IPC-EBW8XXX Build 2015/07 to 2017/03; IPC-PFW8xxx Build 2015/ 07 version to 2017/03 version; IPC-PDBW8xxx Build 2015/07 version to 2017/03 version; IPC-HUM8xxx Build 2015/07 version to 2017/03 version

Trust: 2.88

sources: NVD: CVE-2017-9315 // JVNDB: JVNDB-2017-011143 // ZDI: ZDI-18-130 // CNVD: CNVD-2017-38224 // VULHUB: VHN-117518

IOT TAXONOMY

category:['IoT', 'Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-38224

AFFECTED PRODUCTS

vendor:dahuasecuritymodel:ipc-hfw1xxxscope:eqversion: -

Trust: 1.6

vendor:dahuasecuritymodel:ipc-hfw2xxxscope:eqversion: -

Trust: 1.6

vendor:dahuasecuritymodel:ipc-hdw1xxxscope:eqversion: -

Trust: 1.6

vendor:dahuasecuritymodel:ipc-hdw4xxxscope:eqversion: -

Trust: 1.6

vendor:dahuasecuritymodel:ipc-hfw4xxxscope:eqversion: -

Trust: 1.6

vendor:dahuasecuritymodel:ipc-hdbw1xxxscope:eqversion: -

Trust: 1.6

vendor:dahuasecuritymodel:ipc-hdw2xxxscope:eqversion: -

Trust: 1.6

vendor:dahuasecuritymodel:ipc-hf5xxxscope:eqversion: -

Trust: 1.6

vendor:dahuasecuritymodel:ipc-hdbw2xxxscope:eqversion: -

Trust: 1.6

vendor:dahuasecuritymodel:ipc-hdbw4xxxscope:eqversion: -

Trust: 1.6

vendor:dahuasecuritymodel:ipc-hfw5xxxscope:eqversion: -

Trust: 1.0

vendor:dahuasecuritymodel:ipc-hdbw8xxxscope:eqversion: -

Trust: 1.0

vendor:dahuasecuritymodel:psd8xxxxscope:eqversion: -

Trust: 1.0

vendor:dahuasecuritymodel:dh-sd5xxxxxscope:eqversion: -

Trust: 1.0

vendor:dahuasecuritymodel:ipc-hdw5xxxscope:eqversion: -

Trust: 1.0

vendor:dahuasecuritymodel:dh-sd4xxxxxscope:eqversion: -

Trust: 1.0

vendor:dahuasecuritymodel:ipc-pdbw8xxxscope:eqversion: -

Trust: 1.0

vendor:dahuasecuritymodel:ipc-hf8xxxscope:eqversion: -

Trust: 1.0

vendor:dahuasecuritymodel:ipc-ebw8xxxscope:eqversion: -

Trust: 1.0

vendor:dahuasecuritymodel:ipc-pfw8xxxscope:eqversion: -

Trust: 1.0

vendor:dahuasecuritymodel:dh-sd2xxxxxscope:eqversion: -

Trust: 1.0

vendor:dahuasecuritymodel:ipc-hfw8xxxscope:eqversion: -

Trust: 1.0

vendor:dahuasecuritymodel:dh-sd6xxxxxscope:eqversion: -

Trust: 1.0

vendor:dahuasecuritymodel:ipc-hdbw5xxxscope:eqversion: -

Trust: 1.0

vendor:dahuasecuritymodel:ipc-hum8xxxscope:eqversion: -

Trust: 1.0

vendor:dahuamodel:dh-ipc-hdw1xxxscope: - version: -

Trust: 0.8

vendor:dahuamodel:dh-ipc-hdw2xxxscope: - version: -

Trust: 0.8

vendor:dahuamodel:dh-ipc-hdw4xxxscope: - version: -

Trust: 0.8

vendor:dahuamodel:dh-ipc-hfw1xxxscope: - version: -

Trust: 0.8

vendor:dahuamodel:dh-sd2xxxxxscope: - version: -

Trust: 0.8

vendor:dahuamodel:dh-sd4xxxxxscope: - version: -

Trust: 0.8

vendor:dahuamodel:dh-sd5xxxxxscope: - version: -

Trust: 0.8

vendor:dahuamodel:dh-sd6xxxxxscope: - version: -

Trust: 0.8

vendor:dahuamodel:ipc-ebw8xxxscope: - version: -

Trust: 0.8

vendor:dahuamodel:ipc-hdbw1xxxscope: - version: -

Trust: 0.8

vendor:dahuamodel:ipc-hdbw2xxxscope: - version: -

Trust: 0.8

vendor:dahuamodel:ipc-hdbw4xxxscope: - version: -

Trust: 0.8

vendor:dahuamodel:ipc-hdbw5xxxscope: - version: -

Trust: 0.8

vendor:dahuamodel:ipc-hdbw8xxxscope: - version: -

Trust: 0.8

vendor:dahuamodel:ipc-hdw5xxxscope: - version: -

Trust: 0.8

vendor:dahuamodel:ipc-hf5xxxscope: - version: -

Trust: 0.8

vendor:dahuamodel:ipc-hf8xxxscope: - version: -

Trust: 0.8

vendor:dahuamodel:ipc-hfw2xxxscope: - version: -

Trust: 0.8

vendor:dahuamodel:ipc-hfw4xxxscope: - version: -

Trust: 0.8

vendor:dahuamodel:ipc-hfw5xxxscope: - version: -

Trust: 0.8

vendor:dahuamodel:ipc-hfw8xxxscope: - version: -

Trust: 0.8

vendor:dahuamodel:ipc-hum8xxxscope: - version: -

Trust: 0.8

vendor:dahuamodel:ipc-pdbw8xxxscope: - version: -

Trust: 0.8

vendor:dahuamodel:ipc-pfw8xxxscope: - version: -

Trust: 0.8

vendor:dahuamodel:psd8xxxxscope: - version: -

Trust: 0.8

vendor:dahuamodel:ip camerascope: - version: -

Trust: 0.7

vendor:dahuamodel:security ipc-hf5xxxscope:gteversion:2015/07,<=2017/03

Trust: 0.6

vendor:dahuamodel:security ipc-hfw5xxxscope:gteversion:2015/07,<=2017/03

Trust: 0.6

vendor:dahuamodel:security ipc-hdw5xxxscope:gteversion:2015/07,<=2017/03

Trust: 0.6

vendor:dahuamodel:security ipc-hdbw5xxxscope:gteversion:2015/07,<=2017/03

Trust: 0.6

vendor:dahuamodel:security ipc-hf8xxxscope:gteversion:2015/07,<=2017/03

Trust: 0.6

vendor:dahuamodel:security ipc-hfw8xxxscope:gteversion:2015/07,<=2017/03

Trust: 0.6

vendor:dahuamodel:security ipc-hdbw8xxxscope:gteversion:2015/07,<=2017/03

Trust: 0.6

vendor:dahuamodel:security ipc-ebw8xxxscope:gteversion:2015/07,<=2017/03

Trust: 0.6

vendor:dahuamodel:security ipc-pfw8xxxscope:gteversion:2015/07,<=2017/03

Trust: 0.6

vendor:dahuamodel:security ipc-pdbw8xxxscope:gteversion:2015/07,<=2017/03

Trust: 0.6

vendor:dahuamodel:security ipc-hum8xxxscope:gteversion:2015/07,<=2017/03

Trust: 0.6

vendor:dahuamodel:security psdscope:gteversion:2015/07,<=2017/03

Trust: 0.6

vendor:dahuamodel:security ipc-hfw1xxxscope:gteversion:2015/07,<=2017/03

Trust: 0.6

vendor:dahuamodel:security ipc-hdw1xxxscope:gteversion:2015/07,<=2017/03

Trust: 0.6

vendor:dahuamodel:security ipc-hdbw1xxxscope:gteversion:2015/07,<=2017/03

Trust: 0.6

vendor:dahuamodel:security ipc-hfw2xxxscope:gteversion:2015/07,<=2017/03

Trust: 0.6

vendor:dahuamodel:security ipc-hdw2xxxscope:gteversion:2015/07,<=2017/03

Trust: 0.6

vendor:dahuamodel:security ipc-hdbw2xxxscope:gteversion:2015/07,<=2017/03

Trust: 0.6

vendor:dahuamodel:security ipc-hfw4xxxscope:gteversion:2015/07,<=2017/03

Trust: 0.6

vendor:dahuamodel:security ipc-hdw4xxxscope:gteversion:2015/07,<=2017/03

Trust: 0.6

vendor:dahuamodel:security dh-sd6xxxxxscope:gteversion:2015/07,<=2017/03

Trust: 0.6

vendor:dahuamodel:security dh-sd5xxxxxscope:gteversion:2015/07,<=2017/03

Trust: 0.6

vendor:dahuamodel:security dh-sd4xxxxxscope:gteversion:2015/07,<=2017/03

Trust: 0.6

vendor:dahuamodel:security dh-sd2xxxxxscope:gteversion:2015/07,<=2017/03

Trust: 0.6

sources: ZDI: ZDI-18-130 // CNVD: CNVD-2017-38224 // JVNDB: JVNDB-2017-011143 // CNNVD: CNNVD-201705-1393 // NVD: CVE-2017-9315

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-9315
value: CRITICAL

Trust: 1.0

NVD: CVE-2017-9315
value: CRITICAL

Trust: 0.8

ZDI: CVE-2017-9315
value: HIGH

Trust: 0.7

CNVD: CNVD-2017-38224
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201705-1393
value: CRITICAL

Trust: 0.6

VULHUB: VHN-117518
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-9315
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

ZDI: CVE-2017-9315
severity: HIGH
baseScore: 8.3
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 8.5
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.7

CNVD: CNVD-2017-38224
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-117518
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-9315
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: ZDI: ZDI-18-130 // CNVD: CNVD-2017-38224 // VULHUB: VHN-117518 // JVNDB: JVNDB-2017-011143 // CNNVD: CNNVD-201705-1393 // NVD: CVE-2017-9315

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-310

Trust: 0.9

sources: VULHUB: VHN-117518 // JVNDB: JVNDB-2017-011143 // NVD: CVE-2017-9315

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201705-1393

TYPE

encryption problem

Trust: 0.6

sources: CNNVD: CNNVD-201705-1393

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-011143

PATCH

title:Top Pageurl:http://www.dahuasecurity.com/

Trust: 0.8

title:Dahua Technology has issued an update to correct this vulnerability.url:http://www.dahuasecurity.com/Support/Cybersecurity/annoucementNotice/152

Trust: 0.7

title:Patches for multiple Dahua product password reset vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/111791

Trust: 0.6

title:Multiple Dahua Product security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=99835

Trust: 0.6

sources: ZDI: ZDI-18-130 // CNVD: CNVD-2017-38224 // JVNDB: JVNDB-2017-011143 // CNNVD: CNNVD-201705-1393

EXTERNAL IDS

db:NVDid:CVE-2017-9315

Trust: 3.8

db:JVNDBid:JVNDB-2017-011143

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-4956

Trust: 0.7

db:ZDIid:ZDI-18-130

Trust: 0.7

db:CNNVDid:CNNVD-201705-1393

Trust: 0.7

db:CNVDid:CNVD-2017-38224

Trust: 0.6

db:VULHUBid:VHN-117518

Trust: 0.1

sources: ZDI: ZDI-18-130 // CNVD: CNVD-2017-38224 // VULHUB: VHN-117518 // JVNDB: JVNDB-2017-011143 // CNNVD: CNNVD-201705-1393 // NVD: CVE-2017-9315

REFERENCES

url:http://www.dahuasecurity.com/annoucementsingle/security-advisory--admin-password-recovery-mechanism-in-some-dahua-ip-camera-and-ip-ptz-could-lead-to-security-risk_14731_221.html

Trust: 2.3

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-9315

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-9315

Trust: 0.8

url:http://www.dahuasecurity.com/support/cybersecurity/annoucementnotice/152

Trust: 0.7

sources: ZDI: ZDI-18-130 // CNVD: CNVD-2017-38224 // VULHUB: VHN-117518 // JVNDB: JVNDB-2017-011143 // CNNVD: CNNVD-201705-1393 // NVD: CVE-2017-9315

CREDITS

Kenney Lu Trend Micro

Trust: 0.7

sources: ZDI: ZDI-18-130

SOURCES

db:ZDIid:ZDI-18-130
db:CNVDid:CNVD-2017-38224
db:VULHUBid:VHN-117518
db:JVNDBid:JVNDB-2017-011143
db:CNNVDid:CNNVD-201705-1393
db:NVDid:CVE-2017-9315

LAST UPDATE DATE

2024-11-23T22:56:02.974000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-18-130date:2018-01-19T00:00:00
db:CNVDid:CNVD-2017-38224date:2017-12-27T00:00:00
db:VULHUBid:VHN-117518date:2019-10-03T00:00:00
db:JVNDBid:JVNDB-2017-011143date:2018-01-09T00:00:00
db:CNNVDid:CNNVD-201705-1393date:2019-10-23T00:00:00
db:NVDid:CVE-2017-9315date:2024-11-21T03:35:49.310

SOURCES RELEASE DATE

db:ZDIid:ZDI-18-130date:2018-01-19T00:00:00
db:CNVDid:CNVD-2017-38224date:2017-12-26T00:00:00
db:VULHUBid:VHN-117518date:2017-11-28T00:00:00
db:JVNDBid:JVNDB-2017-011143date:2018-01-09T00:00:00
db:CNNVDid:CNNVD-201705-1393date:2017-05-30T00:00:00
db:NVDid:CVE-2017-9315date:2017-11-28T19:29:00.400