First published: Thu Feb 02 2023(Updated: )
The use of the cyclic redundancy check (CRC) algorithm for integrity check during firmware update makes TRENDnet TV-IP651WI Network Camera firmware version v1.07.01 and earlier vulnerable to firmware modification attacks. An attacker can conduct a man-in-the-middle (MITM) attack to modify the new firmware image and bypass the checksum verification.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trendnet Tv-ip651wi Firmware | <=1.07.01 | |
TRENDnet TV-IP651WI |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-23120 is a vulnerability in the TRENDnet TV-IP651WI Network Camera firmware version v1.07.01 and earlier that makes it vulnerable to firmware modification attacks.
CVE-2023-23120 allows an attacker to conduct a man-in-the-middle (MITM) attack to modify the firmware of the camera.
CVE-2023-23120 has a severity rating of 5.9, which is considered medium.
To fix the vulnerability, it is recommended to update the firmware of the camera to the latest version provided by TRENDnet.
You can find more information about CVE-2023-23120 at the following references: [Reference 1](https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/HJl1oFzci), [Reference 2](https://www.trendnet.com/support/)