ACTi cameras including the D, B, I, and E series using firmware version A1D-500-V6.11.31-AC fail to properly restrict access to the factory reset page. An unauthenticated, remote attacker can exploit this vulnerability by directly accessing the http://x.x.x.x/setup/setup_maintain_firmware-default.html page. This will allow an attacker to perform a factory reset on the device, leading to a denial of service condition or the ability to make use of default credentials (CVE-2017-3186).
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2024-08-05T14:16:28.231Z

Reserved: 2016-12-05T00:00:00

Link: CVE-2017-3184

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-12-16T02:29:10.090

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-3184

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses