First published: Mon Sep 11 2017(Updated: )
Honeywell NVR devices allow remote attackers to create a user account in the admin group by leveraging access to a guest account to obtain a session ID, and then sending that session ID in a userManager.addUser request to the /RPC2 URI. The attacker can login to the device with that new user account to fully control the device.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Honeywell Enterprise Dvr Firmware | ||
Honeywell Enterprise Dvr | ||
Honeywell Maxpro Nvr Hybrid Se Firmware | ||
Honeywell Maxpro Nvr Hybrid Se | ||
Honeywell Maxpro Nvr Hybrid Xe Firmware | ||
Honeywell Maxpro Nvr Hybrid Xe | ||
Honeywell Maxpro Nvr Se Firmware | ||
Honeywell Maxpro Nvr Se | ||
Honeywell Maxpro Nvr Xe Firmware | ||
Honeywell Maxpro Nvr Xe | ||
Honeywell Fusion Iv Rev C Firmware | ||
Honeywell Fusion Iv Rev C | ||
Honeywell Maxpro Nvr Pe Firmware | ||
Honeywell Maxpro Nvr Pe |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.