VAR-201304-0141
Vulnerability from variot - Updated: 2025-04-11 23:16The Arecont Vision AV1355DN MegaDome camera allows remote attackers to cause a denial of service (video-capture outage) via a packet to UDP port 69. Arecont Vision Provided by AV1355DN There is a service disruption (DoS) Vulnerabilities exist. Arecont Vision Provided by AV1355DN Is 69/UDP There is a problem in the processing of the packet addressed to it, and the service operation is interrupted (DoS) Vulnerabilities exist.A remote attacker may stop the recording function of the product. In order to resume the recording function, it is necessary to turn the product off and on again. The Arecont Vision AV1355DN is a network surveillance camera. Arecont Vision AV1355DN MegaDome has been compromised. Crashes can also be triggered by the tools Nessus and NMAP. Arecont Vision AV1355DN is prone to a denial-of-service vulnerability
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201304-0141",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vision av1355dn megadome camera",
"scope": "eq",
"trust": 1.6,
"vendor": "arecont",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "arecont vision",
"version": null
},
{
"model": "megadome series av1355dn",
"scope": null,
"trust": 0.8,
"vendor": "arecont vision",
"version": null
},
{
"model": "vision av1355dn megadome",
"scope": null,
"trust": 0.6,
"vendor": "arecont",
"version": null
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#375180"
},
{
"db": "CNVD",
"id": "CNVD-2013-03329"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002417"
},
{
"db": "CNNVD",
"id": "CNNVD-201304-213"
},
{
"db": "NVD",
"id": "CVE-2013-0139"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:arecont:vision_av1355dn_megadome_camera",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-002417"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Charles Corcoran",
"sources": [
{
"db": "BID",
"id": "59067"
},
{
"db": "CNNVD",
"id": "CNNVD-201304-213"
}
],
"trust": 0.9
},
"cve": "CVE-2013-0139",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2013-0139",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"availabilityRequirement": "NOT DEFINED",
"baseScore": 7.8,
"collateralDamagePotential": "NOT DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT DEFINED",
"enviromentalScore": 5.3,
"exploitability": "HIGH",
"exploitabilityScore": 10.0,
"id": "CVE-2013-0139",
"impactScore": 6.9,
"integrityImpact": "NONE",
"integrityRequirement": "NOT DEFINED",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"remediationLevel": "UNAVAILABLE",
"reportConfidence": "UNCOFIRMED",
"severity": "HIGH",
"targetDistribution": "MEDIUM",
"trust": 0.8,
"userInteractionRequired": null,
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2013-03329",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-60141",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2013-0139",
"trust": 1.6,
"value": "HIGH"
},
{
"author": "nvd@nist.gov",
"id": "CVE-2013-0139",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2013-03329",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201304-213",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-60141",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#375180"
},
{
"db": "CNVD",
"id": "CNVD-2013-03329"
},
{
"db": "VULHUB",
"id": "VHN-60141"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002417"
},
{
"db": "CNNVD",
"id": "CNNVD-201304-213"
},
{
"db": "NVD",
"id": "CVE-2013-0139"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The Arecont Vision AV1355DN MegaDome camera allows remote attackers to cause a denial of service (video-capture outage) via a packet to UDP port 69. Arecont Vision Provided by AV1355DN There is a service disruption (DoS) Vulnerabilities exist. Arecont Vision Provided by AV1355DN Is 69/UDP There is a problem in the processing of the packet addressed to it, and the service operation is interrupted (DoS) Vulnerabilities exist.A remote attacker may stop the recording function of the product. In order to resume the recording function, it is necessary to turn the product off and on again. The Arecont Vision AV1355DN is a network surveillance camera. Arecont Vision AV1355DN MegaDome has been compromised. Crashes can also be triggered by the tools Nessus and NMAP. Arecont Vision AV1355DN is prone to a denial-of-service vulnerability",
"sources": [
{
"db": "NVD",
"id": "CVE-2013-0139"
},
{
"db": "CERT/CC",
"id": "VU#375180"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002417"
},
{
"db": "CNVD",
"id": "CNVD-2013-03329"
},
{
"db": "BID",
"id": "59067"
},
{
"db": "VULHUB",
"id": "VHN-60141"
}
],
"trust": 3.24
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.kb.cert.org/vuls/id/375180",
"trust": 0.8,
"type": "unknown"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#375180"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#375180",
"trust": 3.9
},
{
"db": "NVD",
"id": "CVE-2013-0139",
"trust": 3.4
},
{
"db": "BID",
"id": "59067",
"trust": 1.6
},
{
"db": "JVN",
"id": "JVNVU94295396",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002417",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201304-213",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2013-03329",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-60141",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#375180"
},
{
"db": "CNVD",
"id": "CNVD-2013-03329"
},
{
"db": "VULHUB",
"id": "VHN-60141"
},
{
"db": "BID",
"id": "59067"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002417"
},
{
"db": "CNNVD",
"id": "CNNVD-201304-213"
},
{
"db": "NVD",
"id": "CVE-2013-0139"
}
]
},
"id": "VAR-201304-0141",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-03329"
},
{
"db": "VULHUB",
"id": "VHN-60141"
}
],
"trust": 1.7
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-03329"
}
]
},
"last_update_date": "2025-04-11T23:16:38.220000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "MegaDome Series - AV1355DN",
"trust": 0.8,
"url": "http://www.arecontvision.com/product/MegaDome+Series/AV1355DN"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-002417"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-noinfo",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2013-0139"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.1,
"url": "http://www.kb.cert.org/vuls/id/375180"
},
{
"trust": 0.8,
"url": "about vulnerability notes"
},
{
"trust": 0.8,
"url": "contact us about this vulnerability"
},
{
"trust": 0.8,
"url": "provide a vendor statement"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0139"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnvu94295396"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0139"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/59067"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#375180"
},
{
"db": "CNVD",
"id": "CNVD-2013-03329"
},
{
"db": "VULHUB",
"id": "VHN-60141"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002417"
},
{
"db": "CNNVD",
"id": "CNNVD-201304-213"
},
{
"db": "NVD",
"id": "CVE-2013-0139"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#375180"
},
{
"db": "CNVD",
"id": "CNVD-2013-03329"
},
{
"db": "VULHUB",
"id": "VHN-60141"
},
{
"db": "BID",
"id": "59067"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002417"
},
{
"db": "CNNVD",
"id": "CNNVD-201304-213"
},
{
"db": "NVD",
"id": "CVE-2013-0139"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-04-15T00:00:00",
"db": "CERT/CC",
"id": "VU#375180"
},
{
"date": "2013-04-17T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-03329"
},
{
"date": "2013-04-18T00:00:00",
"db": "VULHUB",
"id": "VHN-60141"
},
{
"date": "2013-04-15T00:00:00",
"db": "BID",
"id": "59067"
},
{
"date": "2013-04-22T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-002417"
},
{
"date": "2013-04-16T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201304-213"
},
{
"date": "2013-04-18T18:55:03.827000",
"db": "NVD",
"id": "CVE-2013-0139"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-04-15T00:00:00",
"db": "CERT/CC",
"id": "VU#375180"
},
{
"date": "2013-05-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-03329"
},
{
"date": "2013-04-19T00:00:00",
"db": "VULHUB",
"id": "VHN-60141"
},
{
"date": "2013-04-15T00:00:00",
"db": "BID",
"id": "59067"
},
{
"date": "2013-04-22T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-002417"
},
{
"date": "2013-04-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201304-213"
},
{
"date": "2025-04-11T00:51:21.963000",
"db": "NVD",
"id": "CVE-2013-0139"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201304-213"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Arecont Vision AV1355DN Denial of Service Vulnerability",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-03329"
},
{
"db": "CNNVD",
"id": "CNNVD-201304-213"
}
],
"trust": 1.2
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Design Error",
"sources": [
{
"db": "BID",
"id": "59067"
}
],
"trust": 0.3
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.