SA ID: DHCC-SA-201711-003
First Published: November 10, 2017
Summary:
Customer of Dahua IP camera or IP PTZ could submit relevant device information to receive a time limited temporary password from Dahua authorized dealer to reset the admin password. The algorithm used in this mechanism is potentially at risk of being compromised and subsequently utilized by attacker.
CVE ID: CVE-2017-9315
Vulnerability Score (CVSS V3.0 http://www.first.org/cvss/specification-document):
Base Score: 7.6(AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L)
Temporal Score: 7.1(E:F/RL:O/RC:C)
Affected Products & Fix Software:
“Fix Software” replaced the password recovery mechanism with a more advanced and secured approach. Please check the document in the following link for details. http://www.dahuasecurity.com/asset/upload/download/Initialization_and_password_reset_for_networking_cameras_V1_EN_20171109.pdf
IP Camera:
IP PTZ:
Fix software download:
Please download the corresponding fix software (or its newer version) as listed in the above table from Dahua website. Customers can also contact Dahua local technical support to obtain the fix software
Support Resources
Dahua technical team will be available to advise and support the upgrade process. For any questions or concerns related to cybersecurity, please contact Dahua at psirt@dahuatech.com
We acknowledge the support of Kenny Lu from Trend Micro working with Zero Day Initiative (ZDI) who discovered this vulnerability and reported to Dahua PSIRT