Attackers can obtain Cloud Key information from the Dahua Web P2P control in specific ways. Cloud Key is used to authenticate the connection between the client tool and the platform. An attacker may use the leaked Cloud Key to impersonate the client to connect to the platform, resulting in additional consumption of platform server resources. Versions with Build time before April 2020 are affected.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: dahua

Published: 2020-05-13T15:17:20

Updated: 2024-08-04T10:34:39.769Z

Reserved: 2020-03-01T00:00:00

Link: CVE-2020-9501

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-05-13T16:15:13.200

Modified: 2024-11-21T05:40:47.050

Link: CVE-2020-9501

cve-icon Redhat

No data.