An issue was discovered in AvertX Auto focus Night Vision HD Indoor/Outdoor IP Dome Camera HD838 and Night Vision HD Indoor/Outdoor Mini IP Bullet Camera HD438. They do not require users to change the default password for the admin account. They only show a pop-up window suggesting a change but there's no enforcement. An administrator can click Cancel and proceed to use the device without changing the password. Additionally, they disclose the default username within the login.js script. Since many attacks for IoT devices, including malware and exploits, are based on the usage of default credentials, it makes these cameras an easy target for malicious actors.
References
Link | Resource |
---|---|
https://unit42.paloaltonetworks.com/avertx-ip-cameras-vulnerabilities/ | Exploit Patch Third Party Advisory |
https://unit42.paloaltonetworks.com/avertx-ip-cameras-vulnerabilities/ | Exploit Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 04:58
Type | Values Removed | Values Added |
---|---|---|
References | () https://unit42.paloaltonetworks.com/avertx-ip-cameras-vulnerabilities/ - Exploit, Patch, Third Party Advisory |
Information
Published : 2020-07-23 21:15
Updated : 2024-11-21 04:58
NVD link : CVE-2020-11624
Mitre link : CVE-2020-11624
CVE.ORG link : CVE-2020-11624
JSON object : View
Products Affected
avertx
- hd438_firmware
- hd838_firmware
- hd438
- hd838
CWE
CWE-521
Weak Password Requirements