Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
None
Privileges Required
High
Attack Vector
Network
0

CVE-2020-9499

Disclosure Date: April 09, 2020
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

Some Dahua products have buffer overflow vulnerabilities. After the successful login of the legal account, the attacker sends a specific DDNS test command, which may cause the device to go down.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
7.2 High
Impact Score:
5.9
Exploitability Score:
1.2
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
High
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
High
Integrity (I):
High
Availability (A):
High

General Information

Vendors

  • dahuasecurity

Products

  • ipc-hx2xxx firmware,
  • ipc-hx5842h firmware,
  • ipc-hx7842h firmware,
  • ipc-hxxx5x4x firmware,
  • n42b1p firmware,
  • n42b2p firmware,
  • n42b3p firmware,
  • n52a4p firmware,
  • n52b2p firmware,
  • n52b3p firmware,
  • n52b5p firmware,
  • n54a4p firmware,
  • n54b2p firmware,
  • ptz1a firmware,
  • sd1a firmware,
  • sd50 firmware,
  • sd52c firmware,
  • sd5a firmware,
  • sd6al firmware

Additional Info

Technical Analysis