First published: Thu Dec 12 2024(Updated: )
This vulnerability allows remote attackers to disclose sensitive information on affected installations of GeoVision GV-ASManager. Although authentication is required to exploit this vulnerability, default guest credentials may be used. The specific flaw exists within the GV-ASWeb service. The issue results from the lack of authorization prior to allowing access to functionality. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise.
Affected Software | Affected Version | How to fix |
---|---|---|
GeoVision |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-25394 is classified as a medium risk vulnerability due to its potential for sensitive information disclosure.
To fix ZDI-CAN-25394, ensure that default guest credentials are changed and apply the latest security patches provided by GeoVision.
ZDI-CAN-25394 affects GeoVision GV-ASManager installations.
ZDI-CAN-25394 requires authentication to exploit, but it can be accessed using default guest credentials.
ZDI-CAN-25394 can potentially disclose sensitive information stored in affected installations of GeoVision GV-ASManager.