First published: Tue Jun 28 2022(Updated: )
When an attacker uses a man-in-the-middle attack to sniff the request packets with success logging in through ONVIF, he can log in to the device by replaying the user's login packet.
Credit: cybersecurity@dahuatech.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dahua IPC-HDBW2431E-S-S2 Firmware | <2022-04 | |
Dahua IPC-HDBW2431E-S-S2 Firmware | ||
Dahuasecurity IPC-HDBW2831E-S-S2 | <2022-04 | |
Dahuasecurity IPC-HDBW2831E-S-S2 Firmware | ||
Dahua IPC-HDBW2230E-S-S2 Firmware | <2022-04 | |
Dahuasecurity IPC-HDBW2230E-S-S2 Firmware | ||
Dahua IPC-HDBW2831R-ZS-S2 Firmware | <2022-04 | |
Dahua IPC-HDBW2831R-ZS-S2 Firmware | ||
Dahua IPC-HDBW2831R-ZAS-S2 | <2022-04 | |
Dahuasecurity IPC-HDBW2831R-ZAS-S2 Firmware | ||
Dahua IPC-HDBW2531R-ZS-S2 Firmware | <2022-04 | |
Dahuasecurity IPC-HDBW2531R-ZS-S2 Firmware | ||
Dahua IPC-HDBW2531R-ZAS-S2 Firmware | <2022-04 | |
Dahua IPC-HDBW2531R-ZAS-S2 Firmware | ||
Dahua IPC-HDBW2531E-S-S2 | <2022-04 | |
Dahua IPC-HDBW2531E-S-S2 | ||
Dahua IPC-HDBW2431R-ZS-S2 | <2022-04 | |
Dahua IPC-HDBW2431R-ZS-S2 | ||
Dahua IPC-HDBW2431R-ZAS-S2 | <2022-04 | |
Dahua IPC-HDBW2431R-ZAS-S2 | ||
Dahua IPC-HDBW2231F-AS-S2 | <2022-04 | |
Dahua IPC-HDBW2231F-AS-S2 | ||
Dahua IPC-HDBW2231E-S-S2 | <2022-04 | |
Dahua IPC-HDBW2231E-S-S2 | ||
Dahuasecurity IPC-HDBW2231R-ZS-S2 Firmware | <2022-04 | |
Dahuasecurity IPC-HDBW2231R-ZS-S2 Firmware | ||
Dahuasecurity IPC-HDBW2231R-ZAS-S2 Firmware | <2022-04 | |
Dahuasecurity IPC-HDBW2231R-ZAS-S2 Firmware | ||
Dahua IPC-HFW2231M-AS-I2-B-S2 | <2022-04 | |
Dahua IPC-HFW2231M-AS-I2-B-S2 | ||
Dahua IPC-HFW2231T-AS-S2 | <2022-04 | |
Dahua IPC-HFW2231T-AS-S2 | ||
Dahua IPC-HFW2231S-S-S2 | <2022-04 | |
Dahuasecurity IPC-HFW2231S-S-S2 Firmware | ||
Dahua IPC-HFW2231T-ZS-S2 | <2022-04 | |
Dahua IPC-HFW2231T-ZS-S2 | ||
Dahuasecurity Ipc-hfw2231t-zas-s2 Firmware | <2022-04 | |
Dahua IPC-HFW2231T-ZAS-S2 | ||
Dahuasecurity Ipc-hfw2230s-s-s2 Firmware | <2022-04 | |
Dahua IPC-HFW2230S-S-S2 | ||
Dahua IPC-HFW2431T-AS-S2 Firmware | <2022-04 | |
Dahua IPC-HFW2431T-AS-S2 Firmware | ||
Dahua IPC-HFW2431T-ZS-S2 | <2022-04 | |
Dahuasecurity Ipc-hfw2431t-zs-s2 Firmware | ||
Dahua IPC-HFW2431T-ZAS-S2 Firmware | <2022-04 | |
Dahua IPC-HFW2431T-ZAS-S2 Firmware | ||
Dahuasecurity IPC-HFW2431S-S-S2 Firmware | <2022-04 | |
Dahuasecurity IPC-HFW2431S-S-S2 Firmware | ||
Dahua IPC-HFW2531T-AS-S2 | <2022-04 | |
Dahua IPC-HFW2531T-AS-S2 | ||
Dahua IPC-HFW2531T-ZS-S2 Firmware | <2022-04 | |
Dahua IPC-HFW2531T-ZS-S2 Firmware | ||
Dahuasecurity IPC-HFW2531T-ZAS-S2 | <2022-04 | |
Dahua IPC-HFW2531T-ZAS-S2 Firmware | ||
Dahua IPC-HFW2531S-S-S2 | <2022-04 | |
Dahuasecurity Ipc-hfw2531s-s-s2 Firmware | ||
Dahua IPC-HFW2831T-AS-S2 | <2022-04 | |
Dahua IPC-HFW2831T-AS-S2 | ||
Dahuasecurity IPC-HFW2831T-ZS-S2 | <2022-04 | |
Dahuasecurity IPC-HFW2831T-ZS-S2 Firmware | ||
Dahua IPC-HFW2831T-ZAS-S2 | <2022-04 | |
Dahua IPC-HFW2831T-ZAS-S2 | ||
Dahuasecurity Ipc-hfw2831s-s-s2 Firmware | <2022-04 | |
Dahuasecurity Ipc-hfw2831s-s-s2 Firmware | ||
Dahuasecurity IPC-HFW2439M-AS-LED-B-S2 | <2022-04 | |
Dahua IPC-HFW2439M-AS-LED-B-S2 | ||
Dahua IPC-HFW2239M-AS-LED-B-S2 Firmware | <2022-04 | |
Dahua IPC-HFW2239M-AS-LED-B-S2 Firmware | ||
Dahua IPC-HFW2439S-SA-LED-S2 | <2022-04 | |
Dahua IPC-HFW2439S-SA-LED-S2 | ||
Dahua IPC-HFW2239S-SA-LED-S2 | <2022-04 | |
Dahua IPC-HFW2239S-SA-LED-S2 | ||
Dahuasecurity Asi7213x-t1 Firmware | <2021-09 | |
Dahuasecurity Asi7213x | ||
Dahuasecurity ASI7223X-A-T1 | <2021-09 | |
Dahuasecurity ASI7223X-A-T1 | ||
Dahuasecurity Asi7223x-a Firmware | <2021-09 | |
Dahuasecurity Asi7223x-a Firmware | ||
Dahuasecurity Asi7213x Firmware | <2021-09 | |
Dahuasecurity Asi7213x Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-30563 has been classified as a high-severity vulnerability.
To mitigate CVE-2022-30563, users should update the affected Dahuasecurity firmware to a version released after April 2022.
CVE-2022-30563 affects multiple Dahuasecurity IPC models running firmware versions prior to April 2022.
CVE-2022-30563 allows attackers to execute a man-in-the-middle attack to replay user login packets.
As an immediate workaround for CVE-2022-30563, limit network access to the devices to trusted networks only.