Dahua Technology DHI-DSS7016D-S2 Firmware 1.001.0000001.2

CPE Details

Dahua Technology DHI-DSS7016D-S2 Firmware 1.001.0000001.2
1.001.0000001.2
2023-01-04
13h46 +00:00
2023-01-04
14h28 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:o:dahuasecurity:dhi-dss7016d-s2_firmware:1.001.0000001.2:*:*:*:*:*:*:*

Informations

Vendor

dahuasecurity

Product

dhi-dss7016d-s2_firmware

Version

1.001.0000001.2

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2022-45423 2022-12-26 23h00 +00:00 Some Dahua software products have a vulnerability of unauthenticated request of MQTT credentials. An attacker can obtain encrypted MQTT credentials by sending a specific crafted packet to the vulnerable interface (the credentials cannot be directly exploited).
7.5
Haute
CVE-2022-45424 2022-12-26 23h00 +00:00 Some Dahua software products have a vulnerability of unauthenticated request of AES crypto key. An attacker can obtain the AES crypto key by sending a specific crafted packet to the vulnerable interface.
5.3
Moyen
CVE-2022-45425 2022-12-26 23h00 +00:00 Some Dahua software products have a vulnerability of using of hard-coded cryptographic key. An attacker can obtain the AES crypto key by exploiting this vulnerability.
7.5
Haute
CVE-2022-45426 2022-12-26 23h00 +00:00 Some Dahua software products have a vulnerability of unrestricted download of file. After obtaining the permissions of ordinary users, by sending a specific crafted packet to the vulnerable interface, an attacker can download arbitrary files.
6.5
Moyen
CVE-2022-45427 2022-12-26 23h00 +00:00 Some Dahua software products have a vulnerability of unrestricted upload of file. After obtaining the permissions of administrators, by sending a specific crafted packet to the vulnerable interface, an attacker can upload arbitrary files.
7.2
Haute
CVE-2022-45428 2022-12-26 23h00 +00:00 Some Dahua software products have a vulnerability of sensitive information leakage. After obtaining the permissions of administrators, by sending a specific crafted packet to the vulnerable interface, an attacker can obtain the debugging information.
2.7
Bas
CVE-2022-45429 2022-12-26 23h00 +00:00 Some Dahua software products have a vulnerability of server-side request forgery (SSRF). An Attacker can access internal resources by concatenating links (URL) that conform to specific rules.
7.5
Haute
CVE-2022-45430 2022-12-26 23h00 +00:00 Some Dahua software products have a vulnerability of unauthenticated enable or disable SSHD service. After bypassing the firewall access control policy, by sending a specific crafted packet to the vulnerable interface, an attacker could enable or disable the SSHD service.
3.7
Bas
CVE-2022-45431 2022-12-26 23h00 +00:00 Some Dahua software products have a vulnerability of unauthenticated restart of remote DSS Server. After bypassing the firewall access control policy, by sending a specific crafted packet to the vulnerable interface, an attacker could unauthenticated restart of remote DSS Server.
7.5
Haute
CVE-2022-45432 2022-12-26 23h00 +00:00 Some Dahua software products have a vulnerability of unauthenticated search for devices. After bypassing the firewall access control policy, by sending a specific crafted packet to the vulnerable interface, an attacker could unauthenticated search for devices in range of IPs from remote DSS Server.
5.3
Moyen
CVE-2022-45433 2022-12-26 23h00 +00:00 Some Dahua software products have a vulnerability of unauthenticated traceroute host from remote DSS Server. After bypassing the firewall access control policy, by sending a specific crafted packet to the vulnerable interface, an attacker could get the traceroute results.
3.7
Bas
CVE-2022-45434 2022-12-26 23h00 +00:00 Some Dahua software products have a vulnerability of unauthenticated un-throttled ICMP requests on remote DSS Server. After bypassing the firewall access control policy, by sending a specific crafted packet to the vulnerable interface, an attacker could exploit the victim server to launch ICMP request attack to the designated target host.
5.9
Moyen