CVE-2024-35341
May 28, 2024, 5:15 p.m.
None
No Score
Description
Certain Anpviz products allow unauthenticated users to download the running configuration of the device via a HTTP GET request to /ConfigFile.ini or /config.xml URIs. This configuration file contains usernames and encrypted passwords (encrypted with a hardcoded key common to all devices). This affects IPC-D250, IPC-D260, IPC-B850, IPC-D850, IPC-D350, IPC-D3150, IPC-D4250, IPC-D380, IPC-D880, IPC-D280, IPC-D3180, MC800N, YM500L, YM800N_N2, YMF50B, YM800SV2, YM500L8, and YM200E10 firmware v3.2.2.2 and lower and possibly more vendors/models of IP camera.
Product(s) Impacted
Product | Versions |
---|---|
Anpviz IPC Cameras |
|
Weaknesses
Common security weaknesses mapped to this vulnerability.
Tags
Timeline
Published: May 28, 2024, 5:15 p.m.
Last Modified: May 28, 2024, 5:15 p.m.
Last Modified: May 28, 2024, 5:15 p.m.
Status : Received
CVE has been recently published to the CVE List and has been received by the NVD.
More infoSource
cve@mitre.org
*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.