First published: Wed May 13 2020(Updated: )
Attackers can obtain Cloud Key information from the Dahua Web P2P control in specific ways. Cloud Key is used to authenticate the connection between the client tool and the platform. An attacker may use the leaked Cloud Key to impersonate the client to connect to the platform, resulting in additional consumption of platform server resources. Versions with Build time before April 2020 are affected.
Credit: cybersecurity@dahuatech.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dahuasecurity Web P2p | <2020-04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-9501 is a vulnerability that allows attackers to obtain Cloud Key information from the Dahua Web P2P control in specific ways.
CVE-2020-9501 allows attackers to obtain Cloud Key information, which is used to authenticate the connection between the client tool and the platform, from the Dahua Web P2P control.
CVE-2020-9501 has a severity rating of 5.5, which is classified as medium.
Attackers can use the leaked Cloud Key to impersonate the client and connect to the platform, which can result in additional unauthorized access or malicious activities.
To fix CVE-2020-9501, it is recommended to apply the latest patches or updates provided by Dahua Security. Additionally, following best practices for network security, such as using strong passwords and regularly monitoring for any suspicious activity, can help mitigate the risk.