First published: Thu Mar 09 2017(Updated: )
An issue was discovered on Dahua DHI-HCVR7216A-S3 3.210.0001.10 build 2016-06-06 devices. The Dahua DVR Protocol, which operates on TCP Port 37777, is an unencrypted, binary protocol. Performing a Man-in-the-Middle attack allows both sniffing and injections of packets, which allows creation of fully privileged new users, in addition to capture of sensitive information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dahua NVR Firmware | =3.210.0001.10 | |
Dahua DHI-HCVR7216A-S3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6432 has a high severity due to the potential for Man-in-the-Middle attacks and exploitation of unencrypted communications.
To mitigate CVE-2017-6432, update to the latest firmware version provided by Dahua that addresses security vulnerabilities.
CVE-2017-6432 affects Dahua DHI-HCVR7216A-S3 devices running firmware version 3.210.0001.10.
CVE-2017-6432 allows for packet sniffing and injection through Man-in-the-Middle attacks due to unencrypted communication on TCP Port 37777.
CVE-2017-6432 does not specifically relate to authentication but allows attackers to manipulate device communications.