First published: Fri Oct 25 2019(Updated: )
Milesight IP security cameras through 2016-11-14 allow remote attackers to bypass authentication and access a protected resource by simultaneously making a request for the unprotected vb.htm resource.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Milesight IP security camera firmware | <=2016-11-14 | |
Milesight NCR Camera |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2359 is classified as a high severity vulnerability due to its ability to allow remote attackers to bypass authentication.
To mitigate CVE-2016-2359, upgrade your Milesight IP security camera firmware to a version released after 2016-11-14.
CVE-2016-2359 affects Milesight IP security camera firmware versions up to and including 2016-11-14.
CVE-2016-2359 is associated with remote authentication bypass attacks.
Yes, CVE-2016-2359 can lead to unauthorized access to protected resources on vulnerable Milesight IP security cameras.