Attackers can obtain Cloud Key information from the Dahua Web P2P control in specific ways. Cloud Key is used to authenticate the connection between the client tool and the platform. An attacker may use the leaked Cloud Key to impersonate the client to connect to the platform, resulting in additional consumption of platform server resources. Versions with Build time before April 2020 are affected.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: dahua
Published: 2020-05-13T15:17:20
Updated: 2024-08-04T10:34:39.769Z
Reserved: 2020-03-01T00:00:00
Link: CVE-2020-9501
Vulnrichment
No data.
NVD
Status : Modified
Published: 2020-05-13T16:15:13.200
Modified: 2024-11-21T05:40:47.050
Link: CVE-2020-9501
Redhat
No data.