First published: Thu Jan 11 2024(Updated: )
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DCS-8300LHV2 IP cameras. Authentication is not required to exploit this vulnerability. The specific flaw exists within the configuration of the ONVIF API. The issue results from the use of a hardcoded PIN. An attacker can leverage this vulnerability to bypass authentication on the system.
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DCS-8300LHV2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-24-049 is considered high due to the ability of network-adjacent attackers to bypass authentication.
To fix ZDI-24-049, ensure you update your D-Link DCS-8300LHV2 IP camera to the latest firmware version provided by the manufacturer.
ZDI-24-049 affects users of D-Link DCS-8300LHV2 IP cameras that are exposed to network-adjacent threats.
ZDI-24-049 allows attackers to bypass authentication, potentially leading to unauthorized access to the camera's feed and settings.
No, authentication is not required to exploit ZDI-24-049, making it a serious security concern.