Zhuhai RaySharp firmware has a hardcoded root password, which makes it easier for remote attackers to obtain access via a session on TCP port 23 or 9000.
References
Link | Resource |
---|---|
http://console-cowboys.blogspot.com/2013/01/swann-song-dvr-insecurity.html | Exploit |
http://seclists.org/bugtraq/2015/Jun/117 | Exploit |
http://www.forbes.com/sites/andygreenberg/2013/01/28/more-than-a-dozen-brands-of-security-camera-systems-vulnerable-to-hacker-hijacking/ | |
http://www.kb.cert.org/vuls/id/899080 | Third Party Advisory US Government Resource |
http://www.kb.cert.org/vuls/id/923388 | Third Party Advisory US Government Resource |
https://community.rapid7.com/community/metasploit/blog/2013/01/23/ray-sharp-cctv-dvr-password-retrieval-remote-root |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: certcc
Published: 2016-02-18T02:00:00
Updated: 2016-02-18T04:57:02
Reserved: 2015-11-19T00:00:00
Link: CVE-2015-8286
JSON object: View
NVD Information
Status : Analyzed
Published: 2016-02-18T05:59:00.200
Modified: 2016-03-07T12:35:39.743
Link: CVE-2015-8286
JSON object: View
Redhat Information
No data.
CWE