Fujitsu Real-time Video Transmission Gear "IP series" use hard-coded credentials, which may allow a remote unauthenticated attacker to initialize or reboot the products, and as a result, terminate the video transmission. Affected products and versions are as follows: IP-HE950E firmware versions V01L001 to V01L053, IP-HE950D firmware versions V01L001 to V01L053, IP-HE900E firmware versions V01L001 to V01L010, IP-HE900D firmware versions V01L001 to V01L004, IP-900E / IP-920E firmware versions V01L001 to V02L061, IP-900D / IP-900ⅡD / IP-920D firmware versions V01L001 to V02L061, IP-90 firmware versions V01L001 to V01L013, and IP-9610 firmware versions V01L001 to V02L007.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: jpcert
Published: 2023-07-26T07:44:04.302Z
Updated: 2024-08-02T17:39:13.693Z
Reserved: 2023-07-18T00:32:29.582Z
Link: CVE-2023-38433
Vulnrichment
No data.
NVD
Status : Modified
Published: 2023-07-26T08:15:10.227
Modified: 2023-11-07T04:17:18.610
Link: CVE-2023-38433
Redhat
No data.