The use of the cyclic redundancy check (CRC) algorithm for integrity check during firmware update makes TRENDnet TV-IP651WI Network Camera firmware version v1.07.01 and earlier vulnerable to firmware modification attacks. An attacker can conduct a man-in-the-middle (MITM) attack to modify the new firmware image and bypass the checksum verification.
References
Link | Resource |
---|---|
https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/HJl1oFzci | Exploit Third Party Advisory |
https://www.trendnet.com/support/ | Vendor Advisory |
https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/HJl1oFzci | Exploit Third Party Advisory |
https://www.trendnet.com/support/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/HJl1oFzci - Exploit, Third Party Advisory | |
References | () https://www.trendnet.com/support/ - Vendor Advisory |
Information
Published : 2023-02-02 17:17
Updated : 2024-11-21 07:45
NVD link : CVE-2023-23120
Mitre link : CVE-2023-23120
CVE.ORG link : CVE-2023-23120
JSON object : View
Products Affected
trendnet
- tv-ip651wi
- tv-ip651wi_firmware
CWE
CWE-354
Improper Validation of Integrity Check Value