Unknown
CVE-2021-33044
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2021-33044
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.
Add Assessment
Ratings
Technical Analysis
On September 5th 2024, CISA released a security bulletin highlighting the cyber-attacks from a Russian actor. In this bulletin CISA confirmed and stated that this vulnerability was abused by the actor to bypass authentication and gain initial access through a vulnerable Dahua IP Camera.
Source: https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-249a
Would you also like to delete your Exploited in the Wild Report?
Delete Assessment Only Delete Assessment and Exploited in the Wild ReportCVSS V3 Severity and Metrics
General Information
Vendors
- dahuasecurity
Products
- ipc-hum7xxx firmware,
- ipc-hx3xxx firmware,
- ipc-hx5xxx firmware,
- sd1a1 firmware,
- sd22 firmware,
- sd41 firmware,
- sd50 firmware,
- sd52c firmware,
- sd6al firmware,
- tpc-bf1241 firmware,
- tpc-bf2221 firmware,
- tpc-bf5x01 firmware,
- tpc-bf5x21 firmware,
- tpc-pt8x21b firmware,
- tpc-sd2221 firmware,
- tpc-sd8x21 firmware,
- vth-542xh firmware,
- vto-65xxx firmware,
- vto-75x95x firmware
Exploited in the Wild
Would you like to delete this Exploited in the Wild Report?
Yes, delete this reportWould you like to delete this Exploited in the Wild Report?
Yes, delete this reportReferences
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: