First published: Thu Jan 11 2024(Updated: )
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DCS-8300LHV2 IP cameras. Authentication is not required to exploit this vulnerability. The specific flaw exists within the configuration of the ONVIF API. The issue results from the use of a hardcoded PIN. An attacker can leverage this vulnerability to bypass authentication on the system.
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DCS-8300LHV2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-21492 has a high severity rating due to the ability of attackers to bypass authentication.
To address ZDI-CAN-21492, update the firmware of your D-Link DCS-8300LHV2 IP camera to the latest version provided by the manufacturer.
ZDI-CAN-21492 can be exploited by network-adjacent attackers who can access the affected devices.
No, ZDI-CAN-21492 does not require authentication to exploit the vulnerability.
The affected product for ZDI-CAN-21492 is the D-Link DCS-8300LHV2 IP camera.