CVE-2019-9682

moderate-risk
Published 2020-05-13

Dahua devices with Build time before December 2019 use strong security login mode by default, but in order to be compatible with the normal login of early devices, some devices retain the weak security login mode that users can control. If the user uses a weak security login method, an attacker can monitor the device network to intercept network packets to attack the device. So it is recommended that the user disable this login method.

Do I need to act?

-
0.42% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.1/10 High
NETWORK / HIGH complexity

Affected Products (20)

Sd5A Firmware
Sd1A Firmware
Ptz1A Firmware
Ipc-Hx5842H Firmware
Ipc-Hx7842H Firmware
Ipc-Hx2Xxx Firmware
Ipc-Hxxx5X4X Firmware
N42B1P Firmware
N42B2P Firmware
N42B3P Firmware
N52A4P Firmware
N54A4P Firmware
N52B2P Firmware
N52B5P Firmware
N52B3P Firmware
N54B2P Firmware
Ipc-Hdbw1320E-W Firmware

Affected Vendors

46
/ 100
moderate-risk
Severity 24/34 · High
Exploitability 2/34 · Minimal
Exposure 20/34 · Moderate