First published: Wed Sep 14 2022(Updated: )
This vulnerability exists in Milesight Video Management Systems (VMS), all firmware versions prior to 40.7.0.79-r1, due to improper input handling at camera’s web-based management interface. A remote attacker could exploit this vulnerability by sending a specially crafted http request on the targeted network camera. Successful exploitation of this vulnerability could allow the attacker to cause a Denial of Service condition on the targeted device.
Credit: vdisclose@cert-in.org.in
Affected Software | Affected Version | How to fix |
---|---|---|
Milesight Video Management Systems Firmware | <40.7.0.79 | |
Milesight Video Management Systems Firmware | =40.7.0.79 | |
Milesight Video Management Systems |
Update Milesight VMS firmware to latest version https://drive.google.com/file/d/1D4I8M_R31CRaA8mZjFnWNgGjnQjtITzB/view?usp=sharing
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-3001 is considered to be high due to the potential for remote exploitation.
To fix CVE-2022-3001, update the Milesight Video Management Systems firmware to version 40.7.0.79 or later.
CVE-2022-3001 can be exploited by sending specially crafted HTTP requests to the vulnerable web-based management interface.
CVE-2022-3001 affects all firmware versions of Milesight Video Management Systems prior to 40.7.0.79.
As of now, there is no known public exploit specifically listed for CVE-2022-3001.