First published: Fri Dec 01 2017(Updated: )
** DISPUTED ** HikVision Wi-Fi IP cameras, when used in a wired configuration, allow physically proximate attackers to trigger association with an arbitrary access point by leveraging a default SSID with no WiFi encryption or authentication. NOTE: Vendor states that this is not a vulnerability, but more an increase to the attack surface of the product.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Hikvision DS-2CD2432F-I(W) Firmware | <5.4.5 | |
Hikvision DS-2CD2432F-I(W) Firmware | ||
Hikvision DS-2CD2432F-I(W) Firmware | <5.4.5 | |
Hikvision DS-2CD2432F-I(W) Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14953 is considered a disputed vulnerability as the vendor claims it is not a vulnerability.
CVE-2017-14953 allows attackers in physical proximity to trigger association with an arbitrary access point due to a default SSID without WiFi encryption.
CVE-2017-14953 affects HikVision DS-2CD2432F-IW firmware versions prior to 5.4.5.
The impact of CVE-2017-14953 includes unauthorized network access by leveraging unprotected default WiFi settings.
To mitigate CVE-2017-14953, users should change the default SSID and ensure WiFi security settings are properly configured.