First published: Mon Aug 29 2022(Updated: )
An improper authentication for critical function issue in Hitachi Kokusai Electric Network products for monitoring system (Camera, Decoder and Encoder) and bellow allows attckers to remotely reboot the device via a crafted POST request to the endpoint /ptipupgrade.cgi. Security information ID hitachi-sec-2022-001 contains fixes for the issue.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Hitachi Hc-ip9100hd Firmware | <=1.07 | |
Hitachi Hc-ip9100hd |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-37680.
The severity of CVE-2022-37680 is high with a severity value of 7.5.
Hitachi Kokusai Electric Network products for monitoring system (Camera, Decoder, and Encoder) with Hitachi Hc-ip9100hd Firmware version 1.07 are affected by CVE-2022-37680.
Attackers can remotely reboot the device by sending a crafted POST request to the /ptipupgrade.cgi endpoint.
More information about CVE-2022-37680 can be found at the following links: [Link 1](https://gist.github.com/Nwqda/5efea18c9142c6a966d85c6be2c0c2b5), [Link 2](https://www.hitachi-kokusai.co.jp/global/en/products/info/vulnerable/hitachi-sec-2022-001/index.html).