6.8
CVSSv2

CVE-2019-9682

Published: 13/05/2020 Updated: 18/05/2020
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.1 | Impact Score: 5.9 | Exploitability Score: 2.2
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Dahua devices with Build time before December 2019 use strong security login mode by default, but in order to be compatible with the normal login of early devices, some devices retain the weak security login mode that users can control. If the user uses a weak security login method, an attacker can monitor the device network to intercept network packets to attack the device. So it is recommended that the user disable this login method.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

dahuasecurity sd6al_firmware

dahuasecurity sd5a_firmware

dahuasecurity sd1a_firmware

dahuasecurity ptz1a_firmware

dahuasecurity sd50_firmware

dahuasecurity sd52c_firmware

dahuasecurity ipc-hx5842h_firmware

dahuasecurity ipc-hx7842h_firmware

dahuasecurity ipc-hx2xxx_firmware

dahuasecurity ipc-hxxx5x4x_firmware

dahuasecurity n42b1p_firmware

dahuasecurity n42b2p_firmware

dahuasecurity n42b3p_firmware

dahuasecurity n52a4p_firmware

dahuasecurity n54a4p_firmware

dahuasecurity n52b2p_firmware

dahuasecurity n52b5p_firmware

dahuasecurity n52b3p_firmware

dahuasecurity n54b2p_firmware

dahuasecurity ipc-hdbw1320e-w_firmware