First published: Fri Jun 12 2020(Updated: )
GeoVision Door Access Control device family is hardcoded with a root password, which adopting an identical password in all devices.
Credit: twcert@cert.org.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Geovision GV-AS210 Firmware | <2.21 | |
Geovision Gv-as210 | ||
Geovision GV-AS410 Firmware | <2.21 | |
Geovision GV-AS410 | ||
Geovision GV-AS810 Firmware | <2.21 | |
Usavisionsys Geovision Gv-as810 Firmware | ||
Geovision GV-AS1010 | <1.32 | |
Geovision GV-AS1010 | ||
Geovision GV-GF192X Firmware | <1.10 | |
Usavisionsys Geovision Gv-gf192x Firmware |
Update to version 2.22 in GV-AS210 Update to version 2.22 in GV-AS410 Update to version 2.22 in GV-AS810 Update to version 1.22 in GV-GF192x Update to version 1.33 in GV-AS1010
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3928 is a vulnerability in the GeoVision Door Access Control device family where a root password is hardcoded in all devices.
CVE-2020-3928 has a severity rating of 9.8, which is considered critical.
The GeoVision GV-AS210, GV-AS410, GV-AS810, GV-AS1010, and GV-GF192x devices are affected by CVE-2020-3928.
To fix CVE-2020-3928, it is recommended to contact the manufacturer for a firmware update or apply any available patches.
More information about CVE-2020-3928 can be found at the following reference: [link](https://www.twcert.org.tw/tw/cp-132-3695-9e72d-1.html)