Certain Anpviz products allow unauthenticated users to download the running configuration of the device via a HTTP GET request to /ConfigFile.ini or /config.xml URIs. This configuration file contains usernames and encrypted passwords (encrypted with a hardcoded key common to all devices). This affects IPC-D250, IPC-D260, IPC-B850, IPC-D850, IPC-D350, IPC-D3150, IPC-D4250, IPC-D380, IPC-D880, IPC-D280, IPC-D3180, MC800N, YM500L, YM800N_N2, YMF50B, YM800SV2, YM500L8, and YM200E10 firmware v3.2.2.2 and lower and possibly more vendors/models of IP camera.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://willgu.es/pages/anpviz-ip-camera-vuln.html |
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-02T03:07:46.924Z
Reserved:
Link: CVE-2024-35341
Vulnrichment
Updated: 2024-07-29T14:35:45.175Z
NVD
Status : Awaiting Analysis
Published: 2024-05-28T17:15:10.443
Modified: 2024-11-21T09:20:09.623
Link: CVE-2024-35341
Redhat
No data.