First published: Fri Jun 12 2020(Updated: )
GeoVision Door Access Control device family employs shared cryptographic private keys for SSH and HTTPS. Attackers may conduct MITM attack with the derived keys and plaintext recover of encrypted messages.
Credit: twcert@cert.org.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Geovision GV-AS210 Firmware | <2.21 | |
Geovision Gv-as210 | ||
Geovision GV-AS410 Firmware | <2.21 | |
Geovision GV-AS410 | ||
Geovision GV-AS810 Firmware | <2.21 | |
Usavisionsys Geovision Gv-as810 Firmware | ||
Geovision GV-AS1010 | <1.32 | |
Geovision GV-AS1010 | ||
Geovision GV-GF192X Firmware | <1.10 | |
Usavisionsys Geovision Gv-gf192x Firmware |
Update to version 2.22 in GV-AS210 Update to version 2.22 in GV-AS410 Update to version 2.22 in GV-AS810 Update to version 1.22 in GV-GF192x Update to version 1.33 in GV-AS1010
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-3929.
The severity of CVE-2020-3929 is medium with a CVSS score of 5.9.
The GeoVision Door Access Control device family employs shared cryptographic private keys for SSH and HTTPS.
The risk associated with CVE-2020-3929 is that attackers may conduct MITM attack with the derived keys and plaintext recover of encrypted messages.
There is no fix available for this vulnerability at the moment.