First published: Wed May 13 2020(Updated: )
Dahua devices with Build time before December 2019 use strong security login mode by default, but in order to be compatible with the normal login of early devices, some devices retain the weak security login mode that users can control. If the user uses a weak security login method, an attacker can monitor the device network to intercept network packets to attack the device. So it is recommended that the user disable this login method.
Credit: cybersecurity@dahuatech.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dahua Security SD6AL Firmware | <2019-12 | |
Dahua Security SD6AL | ||
Dahua Security SD5A Firmware | <2019-12 | |
Dahua Security SD5A Firmware | ||
Dahuasecurity Sd1a1 | <2019-12 | |
Dahuasecurity SD1A | ||
Dahua Security PTZ1A | <2019-12 | |
Dahua Security PTZ1A | ||
Dahuasecurity Sd50 Firmware | <2019-12 | |
Dahuasecurity Sd50 Firmware | ||
Dahuasecurity Sd52c Firmware | <2019-12 | |
Dahuasecurity Sd52c Firmware | ||
Dahuasecurity IPC-HX5842H | <2019-12 | |
Dahuasecurity IPC-HX5842H | ||
Dahuasecurity IPC-HX7842H | <2019-12 | |
Dahuasecurity IPC-HX7842H Firmware | ||
Dahuasecurity IPC-HX2XXX | <2019-12 | |
Dahuasecurity IPC-HX2XXX Firmware | ||
Dahua IPC-HXXX5X4X | <2019-12 | |
Dahua IPC-HXXX5X4X | ||
Dahua Security N42B1P Firmware | <2019-12 | |
Dahua Security N42B1P Firmware | ||
Dahuasecurity N42b2p | <2019-12 | |
Dahuasecurity N42b2p Firmware | ||
Dahuasecurity N42B3P | <2019-12 | |
Dahuasecurity N42b3p Firmware | ||
Dahua Security N52A4P Firmware | <2019-12 | |
Dahua Security N52A4P Firmware | ||
Dahua N54a4p | <2019-12 | |
Dahuasecurity N54a4p Firmware | ||
Dahuasecurity N52b2p | <2019-12 | |
Dahuasecurity N52b2p Firmware | ||
Dahua N52B5P Firmware | <2019-12 | |
Dahua N52B5P Firmware | ||
Dahua N52B3P | <2019-12 | |
Dahua N52B3P | ||
Dahuasecurity N54b2p | <2019-12 | |
Dahuasecurity N54b2p Firmware | ||
Dahua Security IPC-HDBW1320E-W | <2019-12 | |
Dahuasecurity IPC-HDBW1320E-W Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-9682 is a vulnerability found in Dahua devices with build time before December 2019 that allows an attacker to exploit weak security login modes.
CVE-2019-9682 affects Dahua devices with build time before December 2019 by allowing an attacker to exploit weak security login modes.
CVE-2019-9682 has a severity value of 8.1, which is considered high.
To fix CVE-2019-9682, users should update their Dahua devices to the latest firmware released after December 2019.
You can find more information about CVE-2019-9682 on the Dahua Security website at https://www.dahuasecurity.com/support/cybersecurity/details/767.