Dahua.Products.Loopback.Authentication.Bypass
Description
This indicates an attack attempt to exploit an Authentication Bypass Vulnerability in Dahua Products.
The vulnerability is due to a lack of proper validation of user-supplied data. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target device. Successful exploitation could gain control of the affected device.
Outbreak Alert
FortiGuard Labs continues to observe attack attempts exploiting the vulnerabilities highlighted in the recent CISA advisory about Russian military cyber actors. These actors are targeting U.S. and global critical infrastructure to conduct espionage, steal data, and compromise or destroy sensitive information.
Affected Products
Dahua IPC/VTH/VTO/NVR/DVR Series
Impact
Security Bypass: Remote attackers can bypass security features of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://www.dahuasecurity.com/aboutUs/trustedCenter/details/582
Coverage
| IPS (Regular DB) | |
| IPS (Extended DB) |