Firmware developed by Shenzhen Hichip Vision Technology (V6 through V20), as used by many different vendors in millions of Internet of Things devices, suffers from cryptographic issues that allow remote attackers to access user session data, as demonstrated by eavesdropping on user video/audio streams, capturing credentials, and compromising devices. This affects products marketed under the following brand names: Accfly, Alptop, Anlink, Besdersec, BOAVISION, COOAU, CPVAN, Ctronics, D3D Security, Dericam, Elex System, Elite Security, ENSTER, ePGes, Escam, FLOUREON, GENBOLT, Hongjingtian (HJT), ICAMI, Iegeek, Jecurity, Jennov, KKMoon, LEFTEK, Loosafe, Luowice, Nesuniq, Nettoly, ProElite, QZT, Royallite, SDETER, SV3C, SY2L, Tenvis, ThinkValue, TOMLOV, TPTEK, WGCC, and ZILINK.
References
Link | Resource |
---|---|
https://hacked.camera/ | Not Applicable |
https://redprocyon.com | Not Applicable |
https://hacked.camera/ | Not Applicable |
https://redprocyon.com | Not Applicable |
Configurations
History
21 Nov 2024, 05:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://hacked.camera/ - Not Applicable | |
References | () https://redprocyon.com - Not Applicable |
Information
Published : 2020-08-10 16:15
Updated : 2024-11-21 05:40
NVD link : CVE-2020-9528
Mitre link : CVE-2020-9528
CVE.ORG link : CVE-2020-9528
JSON object : View
Products Affected
hichip
- shenzhen_hichip_vision_technology_firmware
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm