First published: Mon Aug 29 2022(Updated: )
Hitachi Kokusai Electric Newtork products for monitoring system (Camera, Decoder and Encoder) and below allows attckers to perform a directory traversal via a crafted GET request to the endpoint /ptippage.cgi. Security information ID hitachi-sec-2022-001 contains fixes for the issue.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Hitachi Hc-ip9100hd Firmware | <=1.07 | |
Hitachi Hc-ip9100hd |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-37681 is high with a CVSS score of 7.5.
Hitachi Kokusai Electric Newtork products for monitoring system (Camera, Decoder and Encoder) with firmware version up to and including 1.07 are affected.
Attackers can exploit CVE-2022-37681 by performing a directory traversal through a crafted GET request to the /ptippage.cgi endpoint.
Yes, security information ID hitachi-sec-2022-001 contains fixes for the issue.
No, Hitachi Hc-ip9100hd is not vulnerable to CVE-2022-37681.