Threat Encyclopedia

DVR.Manufacturers.Configuration.Information.Disclosure

description-logoDescription

This indicates detection of an attempted scan to access configuration files on a unprotected DVR devices.
As access to such files are usually restricted, attempts to access the file might indicates a recon attempt by a malicious actor.

affected-products-logoAffected Products

Vulnerable DVR devices

Impact logoImpact

Information Disclosure: Remote attackers can gain sensitive information from vulnerable systems.

recomended-action-logoRecommended Actions

Monitor the traffic from that network for any suspicious activity.

CVE References

CVE-2013-1391

Telemetry logoTelemetry