Description
Attackers can obtain Cloud Key information from the Dahua Web P2P control in specific ways. Cloud Key is used to authenticate the connection between the client tool and the platform. An attacker may use the leaked Cloud Key to impersonate the client to connect to the platform, resulting in additional consumption of platform server resources. Versions with Build time before April 2020 are affected.
Published: 2020-05-13
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-30307 Attackers can obtain Cloud Key information from the Dahua Web P2P control in specific ways. Cloud Key is used to authenticate the connection between the client tool and the platform. An attacker may use the leaked Cloud Key to impersonate the client to connect to the platform, resulting in additional consumption of platform server resources. Versions with Build time before April 2020 are affected.
History

No history.

Subscriptions

Dahuasecurity Web P2p
cve-icon MITRE

Status: PUBLISHED

Assigner: dahua

Published:

Updated: 2024-08-04T10:34:39.769Z

Reserved: 2020-03-01T00:00:00.000Z

Link: CVE-2020-9501

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-05-13T16:15:13.200

Modified: 2024-11-21T05:40:47.050

Link: CVE-2020-9501

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses