Dahuasecurity.comではCookieならびに類似のテクノロジーを使用しています。Dahuaでは、Webサイトを正常に機能させるために機能性Cookieが使用され、ユーザ体験を最適化するために分析Cookieが使用されています。当社Webサイト外で、サードパーティのCookieによってデータが収集される場合もあります。「 同意します」をクリックするか、このWebサイトの使用を継続すると、Cookieを設定し、それに含まれる個人データが処理されることに同意したと見なされます。Cookieの使用に関する 詳細情報。

Security Advisory - Buffer overflow vulnerability found in some Dahua IP Camera devices

3545

SA ID:DHCC-SA-201906-001


First Published:June 10, 2019


Summary:


Buffer overflow vulnerability found in some Dahua IP Camera devices. The vulnerability exits in the function of redirection display for serial port printing information, which can not be used by product basic functions. After an attacker logs in locally, this vulnerability can be exploited to cause device restart or arbitrary code execution.


Dahua has identified the corresponding security problems in the static code auditing process, so it has gradually deleted this function, which is no longer available in the newer devices and softwares. Dahua has released versions of the affected products to fix the vulnerability.


CVE ID : CVE-2019-9676


Vulnerability Score:http://www.first.org/cvss/specification-document


Base Score:7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)


Affected Products & Fix Software:


Dahua has conducted screening to identify the following affected recorder products.


Affected Model

Firmware Version

Fix Software

IPC-HFW1XXX

Build before 2018/11

DH_IPC-HX1XXX-Eris_EngSpnPrt_P_V2.622.0000000.8.R.190420

DH_IPC-HX1XXX-Eris_EngSpnPrt_N_V2.622.0000000.8.R.190420

DH_IPC-HX2XXX-Eris_Chn_PN_V2.622.0000000.8.R.190420

IPC-HDW1XXX

Build before 2018/11

DH_IPC-HX1XXX-Eris_EngSpnPrt_P_V2.622.0000000.8.R.190420

DH_IPC-HX1XXX-Eris_EngSpnPrt_N_V2.622.0000000.8.R.190420

DH_IPC-HX2XXX-Eris_Chn_PN_V2.622.0000000.8.R.190420

IPC-HFW2XXX

Build before 2018/11

DH_IPC-HX1XXX-Eris_EngSpnPrt_P_V2.622.0000000.8.R.190420

DH_IPC-HX1XXX-Eris_EngSpnPrt_N_V2.622.0000000.8.R.190420

DH_IPC-HX2XXX-Eris_Chn_PN_V2.622.0000000.8.R.190420


Fix software download:


Please download the corresponding fix software (or its newer version) as listed in the above table from Dahua website. Customers can also contact Dahua local technical support to obtain the fix software.


Support Resources


Dahua technical team will be available to advise and support the upgrade process. For any questions or concerns related to cybersecurity, please contact Dahua at cybersecurity@dahuatech.com.


We acknowledge the support of CERT-XLM - Excellium Services CSIRT who discovered this vulnerability and reported to DHCC.