Very High
CVE-2021-33045
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2021-33045
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.
Add Assessment
Ratings
-
Attacker ValueVery High
-
ExploitabilityHigh
Technical Analysis
On September 5th 2024, CISA released a security bulletin highlighting the cyber-attacks from a Russian actor. In this bulletin CISA confirmed and stated that this vulnerability was abused by the actor to bypass authentication and gain initial access through a vulnerable Dahua IP Camera.
Source: https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-249a
Would you also like to delete your Exploited in the Wild Report?
Delete Assessment Only Delete Assessment and Exploited in the Wild ReportCVSS V3 Severity and Metrics
General Information
Vendors
- dahuasecurity
Products
- ipc-hum7xxx firmware,
- ipc-hx3xxx firmware,
- ipc-hx5xxx firmware,
- nvr-1xxx firmware,
- nvr-2xxx firmware,
- nvr-4xxx firmware,
- nvr-5xxx firmware,
- nvr-6xx firmware,
- vth-542xh firmware,
- vto-65xxx firmware,
- vto-75x95x firmware,
- xvr-4x04 firmware,
- xvr-4x04 firmware -,
- xvr-4x08 firmware,
- xvr-5x04 firmware,
- xvr-5x08 firmware,
- xvr-5x16 firmware,
- xvr-7x16 firmware,
- xvr-7x32 firmware
Exploited in the Wild
Would you like to delete this Exploited in the Wild Report?
Yes, delete this reportWould you like to delete this Exploited in the Wild Report?
Yes, delete this reportReferences
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: