CVE-2020-11624

An issue was discovered in AvertX Auto focus Night Vision HD Indoor/Outdoor IP Dome Camera HD838 and Night Vision HD Indoor/Outdoor Mini IP Bullet Camera HD438. They do not require users to change the default password for the admin account. They only show a pop-up window suggesting a change but there's no enforcement. An administrator can click Cancel and proceed to use the device without changing the password. Additionally, they disclose the default username within the login.js script. Since many attacks for IoT devices, including malware and exploits, are based on the usage of default credentials, it makes these cameras an easy target for malicious actors.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:avertx:hd838_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:avertx:hd838:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:avertx:hd438_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:avertx:hd438:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:58

Type Values Removed Values Added
References () https://unit42.paloaltonetworks.com/avertx-ip-cameras-vulnerabilities/ - Exploit, Patch, Third Party Advisory () https://unit42.paloaltonetworks.com/avertx-ip-cameras-vulnerabilities/ - Exploit, Patch, Third Party Advisory

Information

Published : 2020-07-23 21:15

Updated : 2024-11-21 04:58


NVD link : CVE-2020-11624

Mitre link : CVE-2020-11624

CVE.ORG link : CVE-2020-11624


JSON object : View

Products Affected

avertx

  • hd438_firmware
  • hd838_firmware
  • hd438
  • hd838
CWE
CWE-521

Weak Password Requirements