VAR-201711-1048
Vulnerability from variot - Updated: 2025-04-20 23:22Firmware upgrade authentication bypass vulnerability was found in Dahua IPC-HDW4300S and some IP products. The vulnerability was caused by internal Debug function. This particular function was used for problem analysis and performance tuning during product development phase. It allowed the device to receive only specific data (one direction, no transmit) and therefore it was not involved in any instance of collecting user privacy data or allowing remote code execution. plural Dahua Technology The product contains authentication vulnerabilities.Tampering with information and disrupting service operations (DoS) There is a possibility of being put into a state. DahuaIPC-HDW4300S is the IP camera equipment of Dahua Company of China. The following products are affected: Dahua IPC-HDW4300S; NVR11HS; IPC-HFW4X00; IPC-HDW4X00; IPC-HDBW4X00;
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201711-1048",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "nvr11hs",
"scope": "eq",
"trust": 1.6,
"vendor": "dahuasecurity",
"version": "3.210.0000.5.r.20170305"
},
{
"model": "nvr11hs",
"scope": "eq",
"trust": 1.6,
"vendor": "dahuasecurity",
"version": "3.210.0000.5.r.20161226"
},
{
"model": "nvr11hs",
"scope": "eq",
"trust": 1.6,
"vendor": "dahuasecurity",
"version": "3.210.0000.1.r.20150420"
},
{
"model": "nvr11hs",
"scope": "eq",
"trust": 1.6,
"vendor": "dahuasecurity",
"version": "3.210.0000.5.r.20160409"
},
{
"model": "nvr11hs",
"scope": "eq",
"trust": 1.6,
"vendor": "dahuasecurity",
"version": "3.210.0000.5.r.20170321"
},
{
"model": "nvr11hs",
"scope": "eq",
"trust": 1.6,
"vendor": "dahuasecurity",
"version": "3.210.0000.5.r.20160603"
},
{
"model": "nvr11hs",
"scope": "eq",
"trust": 1.6,
"vendor": "dahuasecurity",
"version": "3.210.0000.2.r.20150715"
},
{
"model": "nvr11hs",
"scope": "eq",
"trust": 1.6,
"vendor": "dahuasecurity",
"version": "3.210.0000.3.r.20150921"
},
{
"model": "nvr11hs",
"scope": "eq",
"trust": 1.6,
"vendor": "dahuasecurity",
"version": "3.210.0000.0.r.20150206"
},
{
"model": "nvr11hs",
"scope": "eq",
"trust": 1.6,
"vendor": "dahuasecurity",
"version": "3.210.0000.5.r.20160803"
},
{
"model": "ipc-hdw4300s",
"scope": "eq",
"trust": 1.0,
"vendor": "dahuasecurity",
"version": "2.240.0009.0.r.20131015"
},
{
"model": "ipc-hdw4300s",
"scope": "eq",
"trust": 1.0,
"vendor": "dahuasecurity",
"version": "2.420.0006.0.r.20150311"
},
{
"model": "ipc-hdw4300s",
"scope": "eq",
"trust": 1.0,
"vendor": "dahuasecurity",
"version": "2.420.0000.0.r.20140419"
},
{
"model": "ipc-hdw4300s",
"scope": "eq",
"trust": 1.0,
"vendor": "dahuasecurity",
"version": "2.420.0002.0.r.20140724"
},
{
"model": "ipc-hfw5x00",
"scope": "eq",
"trust": 1.0,
"vendor": "dahuasecurity",
"version": "2.400.0000.3.r.20150312"
},
{
"model": "ipc-hdw4300s",
"scope": "eq",
"trust": 1.0,
"vendor": "dahuasecurity",
"version": "2.420.0005.0.r.20141205"
},
{
"model": "ipc-hdbw5x00",
"scope": "eq",
"trust": 1.0,
"vendor": "dahuasecurity",
"version": "2.400.0000.3.r.20150312"
},
{
"model": "ipc-hdbw4x00",
"scope": "eq",
"trust": 1.0,
"vendor": "dahuasecurity",
"version": "2.400.0000.3.r.20150312"
},
{
"model": "ipc-hdbw4x00",
"scope": "eq",
"trust": 1.0,
"vendor": "dahuasecurity",
"version": "2.420.0006.0.r.20150311"
},
{
"model": "ipc-hfw4x00",
"scope": "eq",
"trust": 1.0,
"vendor": "dahuasecurity",
"version": "2.400.0000.3.r.20150312"
},
{
"model": "ipc-hdw4300s",
"scope": "eq",
"trust": 1.0,
"vendor": "dahuasecurity",
"version": "2.420.0008.0.r.20150710"
},
{
"model": "ipc-hfw4x00",
"scope": "eq",
"trust": 1.0,
"vendor": "dahuasecurity",
"version": "2.420.0006.0.r.20150311"
},
{
"model": "ipc-hf5x00",
"scope": "eq",
"trust": 1.0,
"vendor": "dahuasecurity",
"version": "2.420.0006.0.r.20150311"
},
{
"model": "ipc-hdw4300s",
"scope": "eq",
"trust": 1.0,
"vendor": "dahuasecurity",
"version": "2.420.0007.0.r.20150409"
},
{
"model": "ipc-hdw4300s",
"scope": "eq",
"trust": 1.0,
"vendor": "dahuasecurity",
"version": "2.400.0000.0.r.20131231"
},
{
"model": "ipc-hdw4x00",
"scope": "eq",
"trust": 1.0,
"vendor": "dahuasecurity",
"version": "2.420.0006.0.r.20150311"
},
{
"model": "ipc-hfw5x00",
"scope": "eq",
"trust": 1.0,
"vendor": "dahuasecurity",
"version": "2.420.0006.0.r.20150311"
},
{
"model": "ipc-hdbw5x00",
"scope": "eq",
"trust": 1.0,
"vendor": "dahuasecurity",
"version": "2.420.0006.0.r.20150311"
},
{
"model": "ipc-hdw4x00",
"scope": "eq",
"trust": 1.0,
"vendor": "dahuasecurity",
"version": "2.400.0000.3.r.20150312"
},
{
"model": "ipc-hdw4300s",
"scope": "eq",
"trust": 1.0,
"vendor": "dahuasecurity",
"version": "2.420.0002.0.r.20140621"
},
{
"model": "ipc-hdw5x00",
"scope": "eq",
"trust": 1.0,
"vendor": "dahuasecurity",
"version": "2.400.0000.3.r.20150312"
},
{
"model": "ipc-hdw5x00",
"scope": "eq",
"trust": 1.0,
"vendor": "dahuasecurity",
"version": "2.420.0006.0.r.20150311"
},
{
"model": "ipc-hf5x00",
"scope": "eq",
"trust": 1.0,
"vendor": "dahuasecurity",
"version": "2.400.0000.3.r.20150312"
},
{
"model": "ipc-hdbw4x00",
"scope": null,
"trust": 0.8,
"vendor": "dahua",
"version": null
},
{
"model": "ipc-hdbw5x00",
"scope": null,
"trust": 0.8,
"vendor": "dahua",
"version": null
},
{
"model": "ipc-hdw4300s",
"scope": null,
"trust": 0.8,
"vendor": "dahua",
"version": null
},
{
"model": "ipc-hdw4x00",
"scope": null,
"trust": 0.8,
"vendor": "dahua",
"version": null
},
{
"model": "ipc-hdw5x00",
"scope": null,
"trust": 0.8,
"vendor": "dahua",
"version": null
},
{
"model": "ipc-hf5x00",
"scope": null,
"trust": 0.8,
"vendor": "dahua",
"version": null
},
{
"model": "ipc-hfw4x00",
"scope": null,
"trust": 0.8,
"vendor": "dahua",
"version": null
},
{
"model": "ipc-hfw5x00",
"scope": null,
"trust": 0.8,
"vendor": "dahua",
"version": null
},
{
"model": "nvr11hs",
"scope": null,
"trust": 0.8,
"vendor": "dahua",
"version": null
},
{
"model": "security dh-ipc-hdw1xxx",
"scope": null,
"trust": 0.6,
"vendor": "dahua",
"version": null
},
{
"model": "security dh-ipc-hdw2xxx",
"scope": null,
"trust": 0.6,
"vendor": "dahua",
"version": null
},
{
"model": "security dh-ipc-hdw4xxx",
"scope": null,
"trust": 0.6,
"vendor": "dahua",
"version": null
},
{
"model": "security dh-ipc-hfw1xxx",
"scope": null,
"trust": 0.6,
"vendor": "dahua",
"version": null
},
{
"model": "security dh-ipc-hfw2xxx",
"scope": null,
"trust": 0.6,
"vendor": "dahua",
"version": null
},
{
"model": "security dh-ipc-hfw4xxx",
"scope": null,
"trust": 0.6,
"vendor": "dahua",
"version": null
},
{
"model": "security dh-sd6cxx",
"scope": null,
"trust": 0.6,
"vendor": "dahua",
"version": null
},
{
"model": "security dh-nvr1xxx",
"scope": null,
"trust": 0.6,
"vendor": "dahua",
"version": null
},
{
"model": "security dh-hcvr4xxx",
"scope": null,
"trust": 0.6,
"vendor": "dahua",
"version": null
},
{
"model": "security dh-hcvr5xxx",
"scope": null,
"trust": 0.6,
"vendor": "dahua",
"version": null
},
{
"model": "security nvr11hs",
"scope": null,
"trust": 0.6,
"vendor": "dahua",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-38226"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-011146"
},
{
"db": "CNNVD",
"id": "CNNVD-201705-1392"
},
{
"db": "NVD",
"id": "CVE-2017-9316"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:dahuasecurity:ipc-hdbw4x00_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:dahuasecurity:ipc-hdbw5x00_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:dahuasecurity:ipc-hdw4300s_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:dahuasecurity:ipc-hdw4x00_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:dahuasecurity:ipc-hdw5x00_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:dahuasecurity:ipc-hf5x00_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:dahuasecurity:ipc-hfw4x00_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:dahuasecurity:ipc-hfw5x00_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:dahuasecurity:nvr11hs_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-011146"
}
]
},
"cve": "CVE-2017-9316",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "CVE-2017-9316",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.9,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "CNVD-2017-38226",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "VHN-117519",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"exploitabilityScore": 2.2,
"id": "CVE-2017-9316",
"impactScore": 4.2,
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2017-9316",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2017-9316",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2017-38226",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201705-1392",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-117519",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2017-9316",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-38226"
},
{
"db": "VULHUB",
"id": "VHN-117519"
},
{
"db": "VULMON",
"id": "CVE-2017-9316"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-011146"
},
{
"db": "CNNVD",
"id": "CNNVD-201705-1392"
},
{
"db": "NVD",
"id": "CVE-2017-9316"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Firmware upgrade authentication bypass vulnerability was found in Dahua IPC-HDW4300S and some IP products. The vulnerability was caused by internal Debug function. This particular function was used for problem analysis and performance tuning during product development phase. It allowed the device to receive only specific data (one direction, no transmit) and therefore it was not involved in any instance of collecting user privacy data or allowing remote code execution. plural Dahua Technology The product contains authentication vulnerabilities.Tampering with information and disrupting service operations (DoS) There is a possibility of being put into a state. DahuaIPC-HDW4300S is the IP camera equipment of Dahua Company of China. The following products are affected: Dahua IPC-HDW4300S; NVR11HS; IPC-HFW4X00; IPC-HDW4X00; IPC-HDBW4X00;",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-9316"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-011146"
},
{
"db": "CNVD",
"id": "CNVD-2017-38226"
},
{
"db": "VULHUB",
"id": "VHN-117519"
},
{
"db": "VULMON",
"id": "CVE-2017-9316"
}
],
"trust": 2.34
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-9316",
"trust": 3.2
},
{
"db": "JVNDB",
"id": "JVNDB-2017-011146",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201705-1392",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2017-38226",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-117519",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2017-9316",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-38226"
},
{
"db": "VULHUB",
"id": "VHN-117519"
},
{
"db": "VULMON",
"id": "CVE-2017-9316"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-011146"
},
{
"db": "CNNVD",
"id": "CNNVD-201705-1392"
},
{
"db": "NVD",
"id": "CVE-2017-9316"
}
]
},
"id": "VAR-201711-1048",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-38226"
},
{
"db": "VULHUB",
"id": "VHN-117519"
}
],
"trust": 1.7
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"IoT",
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-38226"
}
]
},
"last_update_date": "2025-04-20T23:22:07.920000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "http://www.dahuasecurity.com/"
},
{
"title": "A variety of Dahua product authentication bypass vulnerability patches",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/111823"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-38226"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-011146"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-287",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-117519"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-011146"
},
{
"db": "NVD",
"id": "CVE-2017-9316"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.4,
"url": "http://www.dahuasecurity.com/annoucementsingle/security-advisory--high-risk-vulnerability-found-in-dahua-ipc-hdw4300s-and-some-ip-products_14731_231.html"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-9316"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-9316"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/287.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-38226"
},
{
"db": "VULHUB",
"id": "VHN-117519"
},
{
"db": "VULMON",
"id": "CVE-2017-9316"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-011146"
},
{
"db": "CNNVD",
"id": "CNNVD-201705-1392"
},
{
"db": "NVD",
"id": "CVE-2017-9316"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2017-38226"
},
{
"db": "VULHUB",
"id": "VHN-117519"
},
{
"db": "VULMON",
"id": "CVE-2017-9316"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-011146"
},
{
"db": "CNNVD",
"id": "CNNVD-201705-1392"
},
{
"db": "NVD",
"id": "CVE-2017-9316"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-12-27T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-38226"
},
{
"date": "2017-11-27T00:00:00",
"db": "VULHUB",
"id": "VHN-117519"
},
{
"date": "2017-11-27T00:00:00",
"db": "VULMON",
"id": "CVE-2017-9316"
},
{
"date": "2018-01-10T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-011146"
},
{
"date": "2017-05-30T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201705-1392"
},
{
"date": "2017-11-27T17:29:00.207000",
"db": "NVD",
"id": "CVE-2017-9316"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-12-27T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-38226"
},
{
"date": "2017-12-20T00:00:00",
"db": "VULHUB",
"id": "VHN-117519"
},
{
"date": "2017-12-20T00:00:00",
"db": "VULMON",
"id": "CVE-2017-9316"
},
{
"date": "2018-01-10T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-011146"
},
{
"date": "2017-11-28T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201705-1392"
},
{
"date": "2025-04-20T01:37:25.860000",
"db": "NVD",
"id": "CVE-2017-9316"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201705-1392"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Dahua Technology Authentication vulnerabilities in products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-011146"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "authorization issue",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201705-1392"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.