CVE-2020-9499
moderate-risk
Published 2020-04-09
Some Dahua products have buffer overflow vulnerabilities. After the successful login of the legal account, the attacker sends a specific DDNS test command, which may cause the device to go down.
Do I need to act?
-
0.53% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.2/10
High
NETWORK
/ LOW complexity
Affected Products (19)
Sd5A Firmware
Sd1A Firmware
Ptz1A Firmware
Ipc-Hx5842H Firmware
Ipc-Hx7842H Firmware
Ipc-Hx2Xxx Firmware
Ipc-Hxxx5X4X Firmware
N42B1P Firmware
N42B2P Firmware
N42B3P Firmware
N52A4P Firmware
N54A4P Firmware
N52B2P Firmware
N52B5P Firmware
N52B3P Firmware
N54B2P Firmware
Affected Vendors
References (2)
Vendor Advisory
https://www.dahuasecurity.com/support/cybersecurity/details/727
Vendor Advisory
https://www.dahuasecurity.com/support/cybersecurity/details/727
47
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
2/34 · Minimal
Exposure
19/34 · Moderate