7.5
CWE
798
Advisory Published
Updated

CVE-2023-38433

First published: Wed Jul 26 2023(Updated: )

Fujitsu Real-time Video Transmission Gear "IP series" use hard-coded credentials, which may allow a remote unauthenticated attacker to initialize or reboot the products, and as a result, terminate the video transmission. Affected products and versions are as follows: IP-HE950E firmware versions V01L001 to V01L053, IP-HE950D firmware versions V01L001 to V01L053, IP-HE900E firmware versions V01L001 to V01L010, IP-HE900D firmware versions V01L001 to V01L004, IP-900E / IP-920E firmware versions V01L001 to V02L061, IP-900D / IP-900?D / IP-920D firmware versions V01L001 to V02L061, IP-90 firmware versions V01L001 to V01L013, and IP-9610 firmware versions V01L001 to V02L007.

Credit: vultures@jpcert.or.jp vultures@jpcert.or.jp

Affected SoftwareAffected VersionHow to fix
Fujitsu Ip-he950e Firmware>=v01l001<=v01l053
Fujitsu Ip-he950e
Fujitsu Ip-he950d Firmware>=v01l001<=v01l053
Fujitsu Ip-he950d
Fujitsu Ip-he900e Firmware>=v01l001<=v01l010
Fujitsu Ip-he900e
Fujitsu Ip-he900d Firmware>=v01l001<=v01l004
Fujitsu Ip-he900d
Fujitsu Ip-900e Firmware>=v01l001<=v02l061
Fujitsu Ip-900e
Fujitsu Ip-920e Firmware>=v01l001<=v02l061
Fujitsu Ip-920e
Fujitsu Ip-900d Firmware>=v01l001<=v02l061
Fujitsu Ip-900d
Fujitsu Ip-900iid Firmware>=v01l001<=v02l061
Fujitsu Ip-900iid
Fujitsu Ip-920d Firmware>=v01l001<=v02l061
Fujitsu Ip-920d
Fujitsu Ip-90 Firmware>=v01l001<=v01l013
Fujitsu Ip-90
Fujitsu Ip-9610 Firmware>=v01l001<=v02l007
Fujitsu Ip-9610

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability ID for this issue?

    The vulnerability ID for this issue is CVE-2023-38433.

  • What is the severity of CVE-2023-38433?

    The severity of CVE-2023-38433 is high.

  • Which products are affected by CVE-2023-38433?

    The IP-HE950E firmware versions V01L001 to V01L053 are affected by CVE-2023-38433.

  • What can an attacker do with this vulnerability?

    An attacker can use hard-coded credentials to initialize or reboot the affected products, resulting in the termination of video transmission.

  • How can I fix CVE-2023-38433?

    To fix CVE-2023-38433, Fujitsu recommends updating the firmware of the affected products to a version that addresses the vulnerability.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203