First published: Tue Jun 28 2022(Updated: )
When an attacker uses a man-in-the-middle attack to sniff the request packets with success logging in, the attacker could log in to the device by replaying the user's login packet.
Credit: cybersecurity@dahuatech.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dahua IPC-HDBW2431E-S-S2 Firmware | <2022-04 | |
Dahua IPC-HDBW2431E-S-S2 Firmware | ||
Dahuasecurity IPC-HDBW2831E-S-S2 | <2022-04 | |
Dahuasecurity IPC-HDBW2831E-S-S2 Firmware | ||
Dahua IPC-HDBW2230E-S-S2 Firmware | <2022-04 | |
Dahuasecurity IPC-HDBW2230E-S-S2 Firmware | ||
Dahua IPC-HDBW2831R-ZS-S2 Firmware | <2022-04 | |
Dahua IPC-HDBW2831R-ZS-S2 Firmware | ||
Dahua IPC-HDBW2831R-ZAS-S2 | <2022-04 | |
Dahuasecurity IPC-HDBW2831R-ZAS-S2 Firmware | ||
Dahua IPC-HDBW2531R-ZS-S2 Firmware | <2022-04 | |
Dahuasecurity IPC-HDBW2531R-ZS-S2 Firmware | ||
Dahua IPC-HDBW2531R-ZAS-S2 Firmware | <2022-04 | |
Dahua IPC-HDBW2531R-ZAS-S2 Firmware | ||
Dahua IPC-HDBW2531E-S-S2 | <2022-04 | |
Dahua IPC-HDBW2531E-S-S2 | ||
Dahua IPC-HDBW2431R-ZS-S2 | <2022-04 | |
Dahua IPC-HDBW2431R-ZS-S2 | ||
Dahua IPC-HDBW2431R-ZAS-S2 | <2022-04 | |
Dahua IPC-HDBW2431R-ZAS-S2 | ||
Dahua IPC-HDBW2231F-AS-S2 | <2022-04 | |
Dahua IPC-HDBW2231F-AS-S2 | ||
Dahua IPC-HDBW2231E-S-S2 | <2022-04 | |
Dahua IPC-HDBW2231E-S-S2 | ||
Dahuasecurity IPC-HDBW2231R-ZS-S2 Firmware | <2022-04 | |
Dahuasecurity IPC-HDBW2231R-ZS-S2 Firmware | ||
Dahuasecurity IPC-HDBW2231R-ZAS-S2 Firmware | <2022-04 | |
Dahuasecurity IPC-HDBW2231R-ZAS-S2 Firmware | ||
Dahua IPC-HFW2231M-AS-I2-B-S2 | <2022-04 | |
Dahua IPC-HFW2231M-AS-I2-B-S2 | ||
Dahua IPC-HFW2231T-AS-S2 | <2022-04 | |
Dahua IPC-HFW2231T-AS-S2 | ||
Dahua IPC-HFW2231S-S-S2 | <2022-04 | |
Dahuasecurity IPC-HFW2231S-S-S2 Firmware | ||
Dahua IPC-HFW2231T-ZS-S2 | <2022-04 | |
Dahua IPC-HFW2231T-ZS-S2 | ||
Dahuasecurity Ipc-hfw2231t-zas-s2 Firmware | <2022-04 | |
Dahua IPC-HFW2231T-ZAS-S2 | ||
Dahuasecurity Ipc-hfw2230s-s-s2 Firmware | <2022-04 | |
Dahua IPC-HFW2230S-S-S2 | ||
Dahua IPC-HFW2431T-AS-S2 Firmware | <2022-04 | |
Dahua IPC-HFW2431T-AS-S2 Firmware | ||
Dahua IPC-HFW2431T-ZS-S2 | <2022-04 | |
Dahuasecurity Ipc-hfw2431t-zs-s2 Firmware | ||
Dahua IPC-HFW2431T-ZAS-S2 Firmware | <2022-04 | |
Dahua IPC-HFW2431T-ZAS-S2 Firmware | ||
Dahuasecurity IPC-HFW2431S-S-S2 Firmware | <2022-04 | |
Dahuasecurity IPC-HFW2431S-S-S2 Firmware | ||
Dahua IPC-HFW2531T-AS-S2 | <2022-04 | |
Dahua IPC-HFW2531T-AS-S2 | ||
Dahua IPC-HFW2531T-ZS-S2 Firmware | <2022-04 | |
Dahua IPC-HFW2531T-ZS-S2 Firmware | ||
Dahuasecurity IPC-HFW2531T-ZAS-S2 | <2022-04 | |
Dahua IPC-HFW2531T-ZAS-S2 Firmware | ||
Dahua IPC-HFW2531S-S-S2 | <2022-04 | |
Dahuasecurity Ipc-hfw2531s-s-s2 Firmware | ||
Dahua IPC-HFW2831T-AS-S2 | <2022-04 | |
Dahua IPC-HFW2831T-AS-S2 | ||
Dahuasecurity IPC-HFW2831T-ZS-S2 | <2022-04 | |
Dahuasecurity IPC-HFW2831T-ZS-S2 Firmware | ||
Dahua IPC-HFW2831T-ZAS-S2 | <2022-04 | |
Dahua IPC-HFW2831T-ZAS-S2 | ||
Dahuasecurity Ipc-hfw2831s-s-s2 Firmware | <2022-04 | |
Dahuasecurity Ipc-hfw2831s-s-s2 Firmware | ||
Dahuasecurity IPC-HFW2439M-AS-LED-B-S2 | <2022-04 | |
Dahua IPC-HFW2439M-AS-LED-B-S2 | ||
Dahua IPC-HFW2239M-AS-LED-B-S2 Firmware | <2022-04 | |
Dahua IPC-HFW2239M-AS-LED-B-S2 Firmware | ||
Dahua IPC-HFW2439S-SA-LED-S2 | <2022-04 | |
Dahua IPC-HFW2439S-SA-LED-S2 | ||
Dahua IPC-HFW2239S-SA-LED-S2 | <2022-04 | |
Dahua IPC-HFW2239S-SA-LED-S2 | ||
Dahuasecurity Asi7213x-t1 Firmware | <2021-09 | |
Dahuasecurity Asi7213x | ||
Dahuasecurity ASI7223X-A-T1 | <2021-09 | |
Dahuasecurity ASI7223X-A-T1 | ||
Dahuasecurity Asi7223x-a Firmware | <2021-09 | |
Dahuasecurity Asi7223x-a Firmware | ||
Dahuasecurity Asi7213x Firmware | <2021-09 | |
Dahuasecurity Asi7213x Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-30561 is classified as a medium severity vulnerability.
To fix CVE-2022-30561, update the firmware of affected Dahuasecurity devices to a version released after April 2022.
CVE-2022-30561 can be exploited through man-in-the-middle attacks, allowing an attacker to replay login packets.
Affected devices include the IPC-HDBW2431E-S-S2, IPC-HDBW2831E-S-S2, IPC-HDBW2230E-S-S2, among others listed in the CVE report.
Yes, CVE-2022-30561 can lead to unauthorized access if an attacker successfully replays a user's login packet.