Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-v4j7-h442-4c52

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Attackers can obtain Cloud Key information from the Dahua Web P2P control in specific ways. Cloud Key is used to authenticate the connection between the client tool and the platform. An attacker may use the leaked Cloud Key to impersonate the client to connect to the platform, resulting in additional consumption of platform server resources. Versions with Build time before April 2020 are affected.

Attackers can obtain Cloud Key information from the Dahua Web P2P control in specific ways. Cloud Key is used to authenticate the connection between the client tool and the platform. An attacker may use the leaked Cloud Key to impersonate the client to connect to the platform, resulting in additional consumption of platform server resources. Versions with Build time before April 2020 are affected.

EPSS

Процентиль: 19%
0.0006
Низкий

Дефекты

CWE-200

Связанные уязвимости

CVSS3: 5.5
nvd
больше 5 лет назад

Attackers can obtain Cloud Key information from the Dahua Web P2P control in specific ways. Cloud Key is used to authenticate the connection between the client tool and the platform. An attacker may use the leaked Cloud Key to impersonate the client to connect to the platform, resulting in additional consumption of platform server resources. Versions with Build time before April 2020 are affected.

EPSS

Процентиль: 19%
0.0006
Низкий

Дефекты

CWE-200