Fujitsu Real-time Video Transmission Gear "IP series" use hard-coded credentials, which may allow a remote unauthenticated attacker to initialize or reboot the products, and as a result, terminate the video transmission. Affected products and versions are as follows: IP-HE950E firmware versions V01L001 to V01L053, IP-HE950D firmware versions V01L001 to V01L053, IP-HE900E firmware versions V01L001 to V01L010, IP-HE900D firmware versions V01L001 to V01L004, IP-900E / IP-920E firmware versions V01L001 to V02L061, IP-900D / IP-900ⅡD / IP-920D firmware versions V01L001 to V02L061, IP-90 firmware versions V01L001 to V01L013, and IP-9610 firmware versions V01L001 to V02L007.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 23 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:fujitsu:ip-900d_firmware:v01l001:*:*:*:*:*:*:*
cpe:2.3:o:fujitsu:ip-900e_firmware:v01l001:*:*:*:*:*:*:*
cpe:2.3:o:fujitsu:ip-900iid_firmware:v01l001:*:*:*:*:*:*:*
cpe:2.3:o:fujitsu:ip-90:*:*:*:*:*:*:*:*
cpe:2.3:o:fujitsu:ip-920d_firmware:v01l001:*:*:*:*:*:*:*
cpe:2.3:o:fujitsu:ip-920e_firmware:v01l001:*:*:*:*:*:*:*
cpe:2.3:o:fujitsu:ip-9610_firmware:v01l001:*:*:*:*:*:*:*
cpe:2.3:o:fujitsu:ip-he900d_firmware:v01l001:*:*:*:*:*:*:*
cpe:2.3:o:fujitsu:ip-he900e_firmware:v01l001:*:*:*:*:*:*:*
cpe:2.3:o:fujitsu:ip-he950d_firmware:v01l001:*:*:*:*:*:*:*
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2024-10-23T14:50:47.908Z

Reserved: 2023-07-18T00:32:29.582Z

Link: CVE-2023-38433

cve-icon Vulnrichment

Updated: 2024-08-02T17:39:13.693Z

cve-icon NVD

Status : Modified

Published: 2023-07-26T08:15:10.227

Modified: 2024-11-21T08:13:33.863

Link: CVE-2023-38433

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.