Fujitsu Real-time Video Transmission Gear "IP series" use hard-coded credentials, which may allow a remote unauthenticated attacker to initialize or reboot the products, and as a result, terminate the video transmission. Affected products and versions are as follows: IP-HE950E firmware versions V01L001 to V01L053, IP-HE950D firmware versions V01L001 to V01L053, IP-HE900E firmware versions V01L001 to V01L010, IP-HE900D firmware versions V01L001 to V01L004, IP-900E / IP-920E firmware versions V01L001 to V02L061, IP-900D / IP-900ⅡD / IP-920D firmware versions V01L001 to V02L061, IP-90 firmware versions V01L001 to V01L013, and IP-9610 firmware versions V01L001 to V02L007.
History

Wed, 23 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:fujitsu:ip-900d_firmware:v01l001:*:*:*:*:*:*:*
cpe:2.3:o:fujitsu:ip-900e_firmware:v01l001:*:*:*:*:*:*:*
cpe:2.3:o:fujitsu:ip-900iid_firmware:v01l001:*:*:*:*:*:*:*
cpe:2.3:o:fujitsu:ip-90:*:*:*:*:*:*:*:*
cpe:2.3:o:fujitsu:ip-920d_firmware:v01l001:*:*:*:*:*:*:*
cpe:2.3:o:fujitsu:ip-920e_firmware:v01l001:*:*:*:*:*:*:*
cpe:2.3:o:fujitsu:ip-9610_firmware:v01l001:*:*:*:*:*:*:*
cpe:2.3:o:fujitsu:ip-he900d_firmware:v01l001:*:*:*:*:*:*:*
cpe:2.3:o:fujitsu:ip-he900e_firmware:v01l001:*:*:*:*:*:*:*
cpe:2.3:o:fujitsu:ip-he950d_firmware:v01l001:*:*:*:*:*:*:*
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published: 2023-07-26T07:44:04.302Z

Updated: 2024-10-23T14:50:47.908Z

Reserved: 2023-07-18T00:32:29.582Z

Link: CVE-2023-38433

cve-icon Vulnrichment

Updated: 2024-08-02T17:39:13.693Z

cve-icon NVD

Status : Modified

Published: 2023-07-26T08:15:10.227

Modified: 2023-11-07T04:17:18.610

Link: CVE-2023-38433

cve-icon Redhat

No data.