Amcrest IP2M-841B ଯେପର୍ଯ୍ୟନ୍ତ 20241211 Web Interface /web_caps/webCapsConfig ସୂଚନା ପ୍ରକାଶ

Rakkoon nageenyaa kan ସମସ୍ୟାଜନକ jedhamuun beekamu Amcrest IP2M-841B, IP2M-841W, IPC-IP2M-841B, IPC-IP3M-943B, IPC-IP3M-943S, IPC-IP3M-HX2B and IPC-IPM-721S ଯେପର୍ଯ୍ୟନ୍ତ 20241211 keessatti argameera. Kan miidhamte is hojii hin beekamne faayilii /web_caps/webCapsConfig keessa kutaa Web Interface keessa. Hojii jijjiirraa gara ସୂଚନା ପ୍ରକାଶ geessa. CWE fayyadamuun rakkoo ibsuun gara CWE-200 geessa. Dadhabbii kana yeroo 12/27/2024 maxxanfameera. Odeeffannoon kun buufachuuf netsecfish.notion.site irratti qoodameera. Dogoggorri kun akka CVE-2024-12984tti beekama. Yaaliin weeraraa fageenya irraa jalqabamuu ni danda'a. Faayidaaleen teeknikaa ni jiru. Waliigalatti, meeshaa balaa kana fayyadamuuf jiru. Qorannoo miidhaa (exploit) uummataaf ifoomameera fi fayyadamamuu danda'a. Amma, gatii ammee exploit might be approx. USD $0-$5k ta'uu danda'a. Akka ପ୍ରୁଫ୍-ଅଫ୍-କନ୍ସେପ୍ଟ jedhamee ibsameera. Carraa exploit kana netsecfish.notion.site irraa buufachuun ni danda'ama. Akka 0-daytti, gatii daldalaa dhoksaa tilmaamame $0-$5k ta'ee ture. Yaada kennamuuf firewall ugguramaa hojiirra oolchuun ni gorfama. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

2 ଆଡାପ୍ଟେସନ୍ · 87 ପଏଣ୍ଟ

ଫିଲ୍ଡସୃଷ୍ଟି ହୋଇଛି
12/27/2024 08:54 AM
ଅଦ୍ୟତନ 1/1
12/27/2024 10:41 PM
software_vendorAmcrestAmcrest
software_nameIP2M-841B/IP2M-841W/IPC-IP2M-841B/IPC-IP3M-943B/IPC-IP3M-943S/IPC-IP3M-HX2B/IPC-IPM-721SIP2M-841B/IP2M-841W/IPC-IP2M-841B/IPC-IP3M-943B/IPC-IP3M-943S/IPC-IP3M-HX2B/IPC-IPM-721S
software_version<=20241211<=20241211
software_componentWeb InterfaceWeb Interface
software_file/web_caps/webCapsConfig/web_caps/webCapsConfig
vulnerability_cweCWE-200 (ସୂଚନା ପ୍ରକାଶ)CWE-200 (ସୂଚନା ପ୍ରକାଶ)
vulnerability_risk11
cvss3_vuldb_avNN
cvss3_vuldb_acLL
cvss3_vuldb_prNN
cvss3_vuldb_uiNN
cvss3_vuldb_sUU
cvss3_vuldb_cLL
cvss3_vuldb_iNN
cvss3_vuldb_aNN
cvss3_vuldb_ePP
cvss3_vuldb_rlWW
cvss3_vuldb_rcRR
advisory_urlhttps://netsecfish.notion.site/AMCREST-IP-Camera-Information-Disclosure-1596b683e67c8045ad10c16b3eed456f?pvs=4https://netsecfish.notion.site/AMCREST-IP-Camera-Information-Disclosure-1596b683e67c8045ad10c16b3eed456f?pvs=4
exploit_availability11
exploit_publicity11
exploit_urlhttps://netsecfish.notion.site/AMCREST-IP-Camera-Information-Disclosure-1596b683e67c8045ad10c16b3eed456f?pvs=4https://netsecfish.notion.site/AMCREST-IP-Camera-Information-Disclosure-1596b683e67c8045ad10c16b3eed456f?pvs=4
countermeasure_nameFirewallFirewall
source_cveCVE-2024-12984CVE-2024-12984
cna_responsibleVulDBVulDB
response_summaryThe vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.
cvss2_vuldb_avNN
cvss2_vuldb_acLL
cvss2_vuldb_auNN
cvss2_vuldb_ciPP
cvss2_vuldb_iiNN
cvss2_vuldb_aiNN
cvss2_vuldb_ePOCPOC
cvss2_vuldb_rcURUR
cvss2_vuldb_rlWW
cvss4_vuldb_avNN
cvss4_vuldb_acLL
cvss4_vuldb_prNN
cvss4_vuldb_uiNN
cvss4_vuldb_vcLL
cvss4_vuldb_viNN
cvss4_vuldb_vaNN
cvss4_vuldb_ePP
cvss4_vuldb_atNN
cvss4_vuldb_scNN
cvss4_vuldb_siNN
cvss4_vuldb_saNN
cvss2_vuldb_basescore5.05.0
cvss2_vuldb_tempscore4.14.1
cvss3_vuldb_basescore5.35.3
cvss3_vuldb_tempscore4.74.7
cvss3_meta_basescore5.35.3
cvss3_meta_tempscore4.75.0
cvss4_vuldb_bscore6.96.9
cvss4_vuldb_btscore5.55.5
advisory_date1735254000 (12/27/2024)1735254000 (12/27/2024)
price_0day$0-$5k$0-$5k
cvss4_cna_avN
cvss4_cna_acL
cvss4_cna_atN
cvss4_cna_prN
cvss4_cna_uiN
cvss4_cna_vcL
cvss4_cna_viN
cvss4_cna_vaN
cvss4_cna_scN
cvss4_cna_siN
cvss4_cna_saN
cvss4_cna_bscore6.9
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prN
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cL
cvss3_cna_iN
cvss3_cna_aN
cvss3_cna_basescore5.3
cvss2_cna_avN
cvss2_cna_acL
cvss2_cna_auN
cvss2_cna_ciP
cvss2_cna_iiN
cvss2_cna_aiN
cvss2_cna_basescore5
cve_nvd_summaryA vulnerability classified as problematic has been found in Amcrest IP2M-841B, IP2M-841W, IPC-IP2M-841B, IPC-IP3M-943B, IPC-IP3M-943S, IPC-IP3M-HX2B and IPC-IPM-721S up to 20241211. This affects an unknown part of the file /web_caps/webCapsConfig of the component Web Interface. The manipulation leads to information disclosure. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Do you want to use VulDB in your project?

Use the official API to access entries easily!