An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. The file-upload endpoint does not enforce authentication. Attackers can send an unauthenticated HTTP request to upload a custom firmware component, possibly in conjunction with command injection, to achieve arbitrary code execution.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/159597/HiSilicon-Video-Encoder-Command-Injection.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/159599/HiSilicon-Video-Encoder-Malicious-Firmware-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/ | Exploit Third Party Advisory |
https://www.kb.cert.org/vuls/id/896979 | Third Party Advisory US Government Resource |
http://packetstormsecurity.com/files/159597/HiSilicon-Video-Encoder-Command-Injection.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/159599/HiSilicon-Video-Encoder-Malicious-Firmware-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/ | Exploit Third Party Advisory |
https://www.kb.cert.org/vuls/id/896979 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
History
21 Nov 2024, 05:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/159597/HiSilicon-Video-Encoder-Command-Injection.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/159599/HiSilicon-Video-Encoder-Malicious-Firmware-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/ - Exploit, Third Party Advisory | |
References | () https://www.kb.cert.org/vuls/id/896979 - Third Party Advisory, US Government Resource |
Information
Published : 2020-10-06 14:15
Updated : 2024-11-21 05:14
NVD link : CVE-2020-24217
Mitre link : CVE-2020-24217
CVE.ORG link : CVE-2020-24217
JSON object : View
Products Affected
szuray
- uhce264-16p32
- uce264-1wb-mini
- uhe264-1s
- uhe265-1-mini
- uhe264-8l-3u
- uhae264-16
- uhe264-1wb-mini
- use265-1-mini
- uhe265-1wb-4g
- use265-1wb-l
- uhe265-4s-1u
- uhe264-8-1u
- uhe265-1-1u
- uhe265-1s-mini
- uhe264-1lw
- uve265-1
- iptv\/h.265_video_encoder_firmware
- uhe265-4-1u
- uhe264-4l-1u
- uhe264-16l-3u
- uhe265-1w-4k
- use264-8-1u
- uhe265-8-1u
- uhe264-1w-mini
- uhe265-1lw
- uhe264-1wb-4g
- use264-1l-1u
- uaioe264-1u
- iptv\/h.264_video_encoder_firmware
- use265-1-1u
- uhe264-1ws-mini
- use265-8-1u
- use264-4l-1u
- uhe264-1s-mini
- uve264-1lw
- uhe265-16l-3u
- uaioe265-1u
- use265-1l-1u
- uhce264-1p2-1u
- uhe264-16
- use265-1l-mini
- use264-1lw
- uhe265-1-4k
- use264-1l-mini
- use265-1wb-mini
- uhce264-1p2
- uhae265-1wb-mini
- use265-4-1u
- uhae265-1-mini
- uhe265-8l-3u
- use265-1lw
- uhe264-8s-2u
- uhe264-16s-2u
- uhe265-1l
- use265-16l-3u
- uhe264-1l-4k
- uhe264-1-4k
- use265-1l
- uhe265-16-3u
- use264-1l
- uve265-1w
- uhe264-2-1u
- use265-1wb-4g
- uhe264-4-1u
- uhe265-4
- uhse265-1u
- uhce264-4p8
- uhe265-1w-mini
- uhe264-1l
- use265-2-1u
- uhce264-1
- uhe264-8
- uve264-1l
- uhe264-4
- uce264-4-1u
- uhae265-4-1u
- uhe265-4s
- uhe264-1wbs-mini
- uhe265-1wbs-mini
- use264-16-3u
- uhe265-1wb-mini
- uhe265-1s-4k
- uce264-1-mini
- uhe265-1w
- uhce264-1ws
- uhe265-1
- uhe264-1wbs-2b
- uhe265-8s-1u
- uhe265-2-1u
- use265-4l-1u
- use265-1w-mini
- use264-1wb-l
- uce264-8-1u
- uhce264-1s
- uhce264-1w
provideoinstruments
- vecaster-4k-hevc
- vecaster-hd-h264_firmware
- vecaster-hd-sdi
- vecaster-hd-hevc_firmware
- vecaster-hd-sdi_firmware
- vecaster-hd-hevc
- vecaster-4k-hevc_firmware
- vecaster-hd-h264
jtechdigital
- h.264_iptv_encoder_1080p\@60hz
- h.264_iptv_encoder_1080p\@60hz_firmware
CWE
CWE-306
Missing Authentication for Critical Function