HikVision Wi-Fi IP cameras, when used in a wired configuration, allow physically proximate attackers to trigger association with an arbitrary access point by leveraging a default SSID with no WiFi encryption or authentication. NOTE: Vendor states that this is not a vulnerability, but more an increase to the attack surface of the product
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/145131/HikVision-Wi-Fi-IP-Camera-Wireless-Access-Point-State.html | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2017/Nov/43 | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2017-12-01 17:29
Updated : 2024-06-18 19:15
NVD link : CVE-2017-14953
Mitre link : CVE-2017-14953
CVE.ORG link : CVE-2017-14953
JSON object : View
Products Affected
hikvision
- ds-2cd2432f-iw_firmware
- ds-2cd2432f-iw
CWE
CWE-311
Missing Encryption of Sensitive Data