Dahuasecurity.com은 쿠키 및 유사 기술을 사용합니다. 다후아는 기능성 쿠키를 사용하여 웹 사이트가 제대로 작동하도록 하고 분석 쿠키를 사용하여 사용자 경험을 최적화합니다. 제3자 쿠키는 당사 웹 사이트 외부에서도 데이터를 수집할 수 있습니다. 다음을 클릭함으로써 동의하시거나 이 웹 사이트를 계속 사용하면 쿠키 설정과 관련된 개인 데이터 처리에 동의하게 됩니다. 다음에 대한 자세한 정보 쿠키 개인정보 처리 방침

Security Advisory –Information leakage vulnerability found in Dahua Web P2P control

336

SA ID:DHCC-SA-202005-001


First Published:2020-5-11


Summary:


CVE-2020-9501:Web P2Pcontrol information leakage vulnerability


Attackers can obtain Cloud Key information from the Dahua Web P2P control in specific ways. Cloud Key is used to authenticate the connection between the client tool and the platform. An attacker may use the leaked Cloud Key to impersonate the client to connect to the platform, resulting in additional consumption of platform server resources.


Vulnerability Score(CVSS V3.1 http://www.first.org/cvss/specification-document):


CVE-2020-9501


Base Score:5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Score:4.6 E:P/RL:O/RC:C


Affected Products & Fix Software:


Dahua has abandoned the web P2P control, replaced the original Cloud Key in the platform server and client tools, and optimized the storage mode of Cloud Key.


Fix Software Download:


Please download the corresponding fix software or its newer version as listed in the above table from Dahua website, or contact Dahua local technical support to upgrade.


Cloud Upgrade: Dahua products have the capability of cloud upgrade. Relevant repair versions can be obtained through cloud upgrade.

Dahua Official Website: Mainland:https://www.dahuasecurity.com/support/downloadCenter

Dahua Technical Support Personnel


Support Resources:


For any questions or concerns related to our products and solutions, please contact Dahua DHCC at cybersecurity@dahuatech.com.

We acknowledge the support of Bashis who discovered this vulnerability and reported to DHCC.