First published: Mon Sep 11 2017(Updated: )
On Samsung NVR devices, remote attackers can read the MD5 password hash of the 'admin' account via certain szUserName JSON data to cgi-bin/main-cgi, and login to the device with that hash in the szUserPasswd parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Samsung Srn 1670d Firmware | ||
Samsung Srn 1670d | ||
Samsung Srn 1000 Firmware | ||
Samsung Srn 1000 | ||
Samsung Srn 472s Firmware | ||
Samsung Srn 472s | ||
Samsung Srn 470d Firmware | ||
Samsung Srn 470d |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14262 is considered a critical vulnerability due to its potential for remote exploitation.
To fix CVE-2017-14262, update the affected Samsung NVR device firmware to the latest version provided by Samsung.
CVE-2017-14262 affects specific Samsung NVR models, including the SRN 1000, SRN 1670D, SRN 470D, and SRN 472S.
Attackers exploiting CVE-2017-14262 can gain unauthorized access to the device using the MD5 password hash of the 'admin' account.
There have been reports indicating that CVE-2017-14262 could be actively targeted by attackers wishing to compromise vulnerable NVR devices.