CVE-2021-41506
moderate-risk
Published 2022-06-30
Xiaongmai AHB7008T-MH-V2, AHB7804R-ELS, AHB7804R-MH-V2, AHB7808R-MS-V2, AHB7808R-MS, AHB7808T-MS-V2, AHB7804R-LMS, HI3518_50H10L_S39 V4.02.R11.7601.Nat.Onvif.20170420, V4.02.R11.Nat.Onvif.20160422, V4.02.R11.7601.Nat.Onvif.20170424, V4.02.R11.Nat.Onvif.20170327, V4.02.R11.Nat.Onvif.20161205, V4.02.R11.Nat.20170301, V4.02.R12.Nat.OnvifS.20170727 is affected by a backdoor in the macGuarder and dvrHelper binaries of DVR/NVR/IP camera firmware due to static root account credentials in the system.
Do I need to act?
~
1.1% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (8)
Ahb7008T-Mh-V2 Firmware
Ahb7804R-Els Firmware
Ahb7804R-Mh-V2 Firmware
Ahb7808R-Ms-V2 Firmware
Ahb7808R-Ms Firmware
Ahb7808T-Ms-V2 Firmware
Ahb7804R-Lms Firmware
Hi3518E 50H10L S39 Firmware
Affected Vendors
References (8)
Third Party Advisory
https://github.com/Snawoot/hisilicon-dvr-telnet
Third Party Advisory
https://github.com/tothi/hs-dvr-telnet
Exploit
https://habr.com/en/post/486856/
Vendor Advisory
https://www.xiongmaitech.com/en/index.php/news/info/12/68
Third Party Advisory
https://github.com/Snawoot/hisilicon-dvr-telnet
Third Party Advisory
https://github.com/tothi/hs-dvr-telnet
Exploit
https://habr.com/en/post/486856/
Vendor Advisory
https://www.xiongmaitech.com/en/index.php/news/info/12/68
49
/ 100
moderate-risk
Severity
32/34 · Critical
Exploitability
3/34 · Minimal
Exposure
14/34 · Moderate