Certain Anpviz products allow unauthenticated users to download the running configuration of the device via a HTTP GET request to /ConfigFile.ini or /config.xml URIs. This configuration file contains usernames and encrypted passwords (encrypted with a hardcoded key common to all devices). This affects IPC-D250, IPC-D260, IPC-B850, IPC-D850, IPC-D350, IPC-D3150, IPC-D4250, IPC-D380, IPC-D880, IPC-D280, IPC-D3180, MC800N, YM500L, YM800N_N2, YMF50B, YM800SV2, YM500L8, and YM200E10 firmware v3.2.2.2 and lower and possibly more vendors/models of IP camera.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-02T03:07:46.924Z

Reserved:

Link: CVE-2024-35341

cve-icon Vulnrichment

Updated: 2024-07-29T14:35:45.175Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-28T17:15:10.443

Modified: 2024-08-01T13:52:36.597

Link: CVE-2024-35341

cve-icon Redhat

No data.