Vulnerability Description
Firmware developed by Shenzhen Hichip Vision Technology (V6 through V20), as used by many different vendors in millions of Internet of Things devices, suffers from cryptographic issues that allow remote attackers to access user session data, as demonstrated by eavesdropping on user video/audio streams, capturing credentials, and compromising devices. This affects products marketed under the following brand names: Accfly, Alptop, Anlink, Besdersec, BOAVISION, COOAU, CPVAN, Ctronics, D3D Security, Dericam, Elex System, Elite Security, ENSTER, ePGes, Escam, FLOUREON, GENBOLT, Hongjingtian (HJT), ICAMI, Iegeek, Jecurity, Jennov, KKMoon, LEFTEK, Loosafe, Luowice, Nesuniq, Nettoly, ProElite, QZT, Royallite, SDETER, SV3C, SY2L, Tenvis, ThinkValue, TOMLOV, TPTEK, WGCC, and ZILINK.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Hichip | Shenzhen Hichip Vision Technology Firmware | < 2020-06-29 |
Related Weaknesses (CWE)
References
- https://hacked.camera/Not Applicable
- https://redprocyon.comNot Applicable
- https://hacked.camera/Not Applicable
- https://redprocyon.comNot Applicable
FAQ
What is CVE-2020-9528?
CVE-2020-9528 is a vulnerability with a CVSS score of 7.5 (HIGH). Firmware developed by Shenzhen Hichip Vision Technology (V6 through V20), as used by many different vendors in millions of Internet of Things devices, suffers from cryptographic issues that allow remo...
How severe is CVE-2020-9528?
CVE-2020-9528 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-9528?
Check the references section above for vendor advisories and patch information. Affected products include: Hichip Shenzhen Hichip Vision Technology Firmware.