First published: Fri Oct 25 2019(Updated: )
Milesight IP security cameras through 2016-11-14 have a default set of 10 privileged accounts with hardcoded credentials. They are accessible if the customer has not configured 10 actual user accounts.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Milesight IP security camera firmware | <=2016-11-14 | |
Milesight NCR Camera |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2358 has a high severity rating due to the presence of hardcoded credentials in multiple privileged accounts.
To fix CVE-2016-2358, customers should configure unique user accounts and disable the default privileged accounts.
CVE-2016-2358 affects Milesight IP security cameras running firmware versions up to and including 2016-11-14.
A workaround for CVE-2016-2358 is to change all default passwords for the privileged accounts as soon as possible.
The risks of CVE-2016-2358 include unauthorized access to the camera system and potential exploitation by attackers.