CVE-2021-33544 (GCVE-0-2021-33544)

Vulnerability from cvelistv5 – Published: 2021-09-13 17:55 – Updated: 2024-09-16 17:03
VLAI?
Title
UDP Technology/Geutebrück camera devices: command injection leading to RCE
Summary
Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to command injection, which may allow an attacker to remotely execute arbitrary code.
CWE
  • CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
Impacted products
Vendor Product Version
Geutebrück E2 Series Affected: EBC-21xx 1.12.13.2
Affected: EBC-21xx 1.12.14.5
Affected: EFD-22xx 1.12.13.2
Affected: EFD-22xx 1.12.14.5
Affected: ETHC-22xx 1.12.13.2
Affected: ETHC-22xx 1.12.14.5
Affected: EWPC-22xx 1.12.13.2
Affected: EWPC-22xx 1.12.14.5
Affected: EBC-21xx , ≤ 1.12.0.27 (custom)
Affected: EFD-22xx , ≤ 1.12.0.27 (custom)
Affected: ETHC-22xx , ≤ 1.12.0.27 (custom)
Affected: EWPC-22xx , ≤ 1.12.0.27 (custom)
Create a notification for this product.
Geutebrück Encoder G-Code Affected: EEC-2xx 1.12.13.2
Affected: EEC-2xx 1.12.14.5
Affected: EEN-20xx 1.12.13.2
Affected: EEN-20xx 1.12.14.5
Affected: EEC-2xx , ≤ 1.12.0.27 (custom)
Affected: EEN-20xx , ≤ 1.12.0.27 (custom)
Create a notification for this product.
Date Public ?
2021-08-31 00:00
Credits
Titouan Lazard and Ibrahim Ayadhi from RandoriSec reported these vulnerabilities.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T23:50:43.190Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-208-03"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "E2 Series",
          "vendor": "Geutebr\u00fcck",
          "versions": [
            {
              "status": "affected",
              "version": "EBC-21xx 1.12.13.2"
            },
            {
              "status": "affected",
              "version": "EBC-21xx 1.12.14.5"
            },
            {
              "status": "affected",
              "version": "EFD-22xx 1.12.13.2"
            },
            {
              "status": "affected",
              "version": "EFD-22xx 1.12.14.5"
            },
            {
              "status": "affected",
              "version": "ETHC-22xx 1.12.13.2"
            },
            {
              "status": "affected",
              "version": "ETHC-22xx 1.12.14.5"
            },
            {
              "status": "affected",
              "version": "EWPC-22xx 1.12.13.2"
            },
            {
              "status": "affected",
              "version": "EWPC-22xx 1.12.14.5"
            },
            {
              "lessThanOrEqual": "1.12.0.27",
              "status": "affected",
              "version": "EBC-21xx",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "1.12.0.27",
              "status": "affected",
              "version": "EFD-22xx",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "1.12.0.27",
              "status": "affected",
              "version": "ETHC-22xx",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "1.12.0.27",
              "status": "affected",
              "version": "EWPC-22xx",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Encoder G-Code",
          "vendor": "Geutebr\u00fcck",
          "versions": [
            {
              "status": "affected",
              "version": "EEC-2xx 1.12.13.2"
            },
            {
              "status": "affected",
              "version": "EEC-2xx 1.12.14.5"
            },
            {
              "status": "affected",
              "version": "EEN-20xx 1.12.13.2"
            },
            {
              "status": "affected",
              "version": "EEN-20xx 1.12.14.5"
            },
            {
              "lessThanOrEqual": "1.12.0.27",
              "status": "affected",
              "version": "EEC-2xx",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "1.12.0.27",
              "status": "affected",
              "version": "EEN-20xx",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Titouan Lazard and Ibrahim Ayadhi from RandoriSec reported these vulnerabilities."
        }
      ],
      "datePublic": "2021-08-31T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple camera devices by UDP Technology, Geutebr\u00fcck and other vendors are vulnerable to command injection, which may allow an attacker to remotely execute arbitrary code."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-02T00:00:00.000Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/"
        },
        {
          "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-208-03"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "UDP Technology/Geutebr\u00fcck camera devices: command injection leading to RCE",
      "x_generator": {
        "engine": "vulnogram 0.1.0-rc1"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2021-33544",
    "datePublished": "2021-09-13T17:55:33.770Z",
    "dateReserved": "2021-05-24T00:00:00.000Z",
    "dateUpdated": "2024-09-16T17:03:56.732Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "epss": {
      "cve": "CVE-2021-33544",
      "date": "2026-05-19",
      "epss": "0.94247",
      "percentile": "0.99932"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-33544\",\"sourceIdentifier\":\"info@cert.vde.com\",\"published\":\"2021-09-13T18:15:21.130\",\"lastModified\":\"2024-11-21T06:09:03.347\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple camera devices by UDP Technology, Geutebr\u00fcck and other vendors are vulnerable to command injection, which may allow an attacker to remotely execute arbitrary code.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples dispositivos de c\u00e1mara de UDP Technology, Geutebr\u00c3\u00bcck y otros proveedores, son vulnerables a una inyecci\u00f3n de comandos, que puede permitir a un atacante ejecutar c\u00f3digo arbitrario remotamente\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"info@cert.vde.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:P/A:P\",\"baseScore\":6.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"info@cert.vde.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_ebc-2110_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.12.0.27\",\"matchCriteriaId\":\"D112B35C-B264-40A0-83D1-E55B9036913A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_ebc-2110_firmware:1.12.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22660A4B-ABFC-466D-9E0C-2EF4BD7A98F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_ebc-2110_firmware:1.12.14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E6939CF-1255-4E41-9199-B20471BDE977\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:geutebrueck:g-cam_ebc-2110:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"181CBC12-DCC7-49AB-A9EC-8581D14333D6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_ebc-2111_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.12.0.27\",\"matchCriteriaId\":\"CFC70BCD-CBC1-4556-93C2-BAA4A5E0AE3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_ebc-2111_firmware:1.12.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FB8A43B-E79D-4AC2-83ED-C29AAEA35E89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_ebc-2111_firmware:1.12.14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC4847BD-E880-42DD-8A93-64042F286DFC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:geutebrueck:g-cam_ebc-2111:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F93DB9C2-07FA-4EE6-B079-0189E73C4033\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_efd-2241_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.12.0.27\",\"matchCriteriaId\":\"11754F1F-D3C6-490D-BA6E-AB5B17460F1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_efd-2241_firmware:1.12.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E75EFC79-4453-4D6F-81A7-F0954EBCBA63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_efd-2241_firmware:1.12.14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AED71348-C669-44DD-8670-9361D77F4995\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:geutebrueck:g-cam_efd-2241:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"571918FA-7A65-4DED-83BD-4EBB73417430\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_efd-2250_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.12.0.27\",\"matchCriteriaId\":\"F5230A0E-1D52-4C82-AB2A-FD4C5714AA6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_efd-2250_firmware:1.12.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B2BC819-B425-41D2-BEDE-943B5D4781B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_efd-2250_firmware:1.12.14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"966334C5-628B-444F-8992-2DB8857BE797\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:geutebrueck:g-cam_efd-2250:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0D67535-75F6-4467-9834-FBEFE5E9CB4B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_ethc-2230_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.12.0.27\",\"matchCriteriaId\":\"498E6BC9-3B2C-4F7C-9A76-7DDA3CE55E62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_ethc-2230_firmware:1.12.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1438441-4FDD-4C13-A230-EFE53DF8BBBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_ethc-2230_firmware:1.12.14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E5DEF62-A9EA-46A8-8BE2-603356F50493\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:geutebrueck:g-cam_ethc-2230:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B1A2A83-64B9-44D5-9BCC-0DB4ED628F7B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_ethc-2239_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.12.0.27\",\"matchCriteriaId\":\"985CAD50-895C-4DFB-A41F-77A44C44D8B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_ethc-2239_firmware:1.12.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCF30D97-6FC0-4D80-B8A4-B24078FDBA4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_ethc-2239_firmware:1.12.14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"843E4BCD-598B-457E-BB4F-17F29052C27B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:geutebrueck:g-cam_ethc-2239:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35C88F5F-1340-41B6-85E0-84954A3E2C0F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_ethc-2240_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.12.0.27\",\"matchCriteriaId\":\"DB0BB4B5-FFB9-40C2-B1E5-D1ECBFA550F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_ethc-2240_firmware:1.12.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0374A073-CAC4-4137-94DE-50035DC52DB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_ethc-2240_firmware:1.12.14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AFF5C0B-9493-4B7C-983F-EC3418B52DB8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:geutebrueck:g-cam_ethc-2240:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACDA66D2-4E05-48F3-A710-30FB1BFBB22E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_ethc-2249_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.12.0.27\",\"matchCriteriaId\":\"886C810D-2D03-45C1-BBFB-1A290374EE92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_ethc-2249_firmware:1.12.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7851EE3-21FB-4447-A5B7-DFAFC335845B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_ethc-2249_firmware:1.12.14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB0CDFBB-DA48-4E41-BDA2-01179AF04EA2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:geutebrueck:g-cam_ethc-2249:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EB8C61F-AA77-4D33-9BCB-D1F01020E47C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_ewpc-2270_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.12.0.27\",\"matchCriteriaId\":\"C67E1A48-7907-448A-9E29-6964BEA54AA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_ewpc-2270_firmware:1.12.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16E2C1A4-E048-4DB8-8FB2-B020AD1F37F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_ewpc-2270_firmware:1.12.14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FA3BBD7-77C8-4E78-81EC-EF0B3123F75D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:geutebrueck:g-cam_ewpc-2270:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7E4E8B5-D432-471D-A612-86AA7B83E49D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-code_eec-2400_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.12.0.27\",\"matchCriteriaId\":\"F2AFB104-E3B2-4CBF-93A7-13DD14A509DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-code_eec-2400_firmware:1.12.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1DDDFD1-0428-4909-8079-D696D45ECED8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-code_eec-2400_firmware:1.12.14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"894AB862-E9E5-4E7B-A3FC-945C315911A6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:geutebrueck:g-code_eec-2400:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"729D81B8-66E8-44D9-B794-ED4A8E869E10\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-code_een-2010_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.12.0.27\",\"matchCriteriaId\":\"3808D6AA-3D02-44F1-8914-018BB17B2429\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-code_een-2010_firmware:1.12.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC42C86C-8DAC-469C-9A6C-41F1D6E48891\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-code_een-2010_firmware:1.12.14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70924709-F815-4E43-9FCC-BAFFF7154DAF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:geutebrueck:g-code_een-2010:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E71CBF86-3629-4F90-837F-DB9907AE2058\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-code_een-2040_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.12.0.27\",\"matchCriteriaId\":\"6ADD66ED-4A4C-4B95-95CA-A116AAB52C5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-code_een-2040_firmware:1.12.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A527F7AB-0434-4BC4-95EF-E1F18BDAC2B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-code_een-2040_firmware:1.12.14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E23967D9-54C1-40C8-AB9F-61BAF2EAF9E3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:geutebrueck:g-code_een-2040:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FB10D7B-5FA5-486E-AE01-D96B901036A4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_ebc-2112_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.12.0.27\",\"matchCriteriaId\":\"E6F25262-F719-4B70-8782-F23FB546A140\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_ebc-2112_firmware:1.12.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF81F56A-6D0A-4294-937F-C4F82259F538\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_ebc-2112_firmware:1.12.14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2395E255-6FA5-4C74-938B-F94A20B02943\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:geutebrueck:g-cam_ebc-2112:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A7FEC97-E87B-47A8-A171-0CF22EAD54D8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_efd-2251_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.12.0.27\",\"matchCriteriaId\":\"4D534DDA-8AD5-4FCC-BBA3-499F20230506\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_efd-2251_firmware:1.12.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"670D86CA-F192-49C0-B7BA-580A94A5DF59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_efd-2251_firmware:1.12.14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A5D0DDC-5C4C-4948-ADF9-0A2D40D7E8FF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:geutebrueck:g-cam_efd-2251:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"424F7E3B-565A-4E9B-942E-C241A08FAF33\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_ewpc-2275_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.12.0.27\",\"matchCriteriaId\":\"E0BCBCFE-CAFF-4C12-99BB-39A6A0B86A7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_ewpc-2275_firmware:1.12.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41D9C92C-BDAB-4062-A9EF-A1CF4BA19F0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_ewpc-2275_firmware:1.12.14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE138FC3-80A6-45F1-8AD2-EA5842351B67\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:geutebrueck:g-cam_ewpc-2275:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F2AC61F-6C50-4B2F-A260-4FB128BFC956\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_ewpc-2271_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.12.0.27\",\"matchCriteriaId\":\"EC9252C6-B2F6-4476-8294-98695218D26B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_ewpc-2271_firmware:1.12.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C5A8920-DC4C-4E7A-8A09-95987B81C1B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:geutebrueck:g-cam_ewpc-2271_firmware:1.12.14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4328D71C-125E-414D-BFE9-F83C5B5AB646\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:geutebrueck:g-cam_ewpc-2271:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62EB57D9-0F72-40CD-A776-68121B19D06B\"}]}]}],\"references\":[{\"url\":\"https://us-cert.cisa.gov/ics/advisories/icsa-21-208-03\",\"source\":\"info@cert.vde.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/\",\"source\":\"info@cert.vde.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://us-cert.cisa.gov/ics/advisories/icsa-21-208-03\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…