Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:hisilicon:hi3510_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "871A2013-BA46-4EFC-B378-680947FB8DA5", "versionEndExcluding": "1.0.1", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:hisilicon:hi3510:-:*:*:*:*:*:*:*", "matchCriteriaId": "862E0003-FAE8-4759-889F-F09597219164", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "Incorrect access control in the RTSP stream and web portal on all IP cameras based on Hisilicon Hi3510 firmware (until Webware version V1.0.1) allows attackers to view an RTSP stream by connecting to the stream with hidden credentials (guest or user) that are neither displayed nor configurable in the camera's CamHi or keye mobile management application. This affects certain devices labeled as HI3510, HI3518, LOOSAFE, LEVCOECAM, Sywstoda, BESDER, WUSONGLUSAN, GADINAN, Unitoptek, ESCAM, etc."}, {"lang": "es", "value": "El control de acceso incorrecto en el flujo RTSP y en el portal web de todas las c\u00e1maras IP con firmware Hisilicon Hi3510 (hasta la versi\u00f3n de Webware V1.0.1), permite a los atacantes ver una transmisi\u00f3n RTSP conect\u00e1ndose a una transmisi\u00f3n con credenciales ocultas (invitado o usuario) que no se muestran ni se pueden configurar en la aplicaci\u00f3n de gesti\u00f3n CamHi o keye mobile de la c\u00e1mara. Esto afecta a ciertos dispositivos etiquetados como HI3510, HI3518, LOOSAFE, LEVCOECAM, Sywstoda, BESDER, WUSONGLUSAN, GADINAN, Unitoptek, ESCAM, etc."}], "id": "CVE-2019-10711", "lastModified": "2024-11-21T04:19:47.173", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2019-04-23T20:32:43.087", "references": [{"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://dojo.bullguard.com/dojo-by-bullguard/blog/cam-hi-risk/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://dojo.bullguard.com/dojo-by-bullguard/blog/cam-hi-risk/"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-noinfo"}], "source": "nvd@nist.gov", "type": "Primary"}]}